Fixing Risk Sharing With Observability

Source:-https://devops.com/ Incentives are mismatched among SREs, SecOps, and application developers. These mismatches create challenges around how and what information is shared across siloed teams. This asymmetrical information creates a moral hazard where one team can shift deployment risk to another team, with no accountability back to the originating team. Risk shifting results in unstable applications, inefficient infrastructure, security issues and poor customer experience. All of that impacts your company’s bottom line. Closing the Information Gap Observability is positioned as a

Read more

Okta updates its developer experience with revamped applications and APIs

Source:-https://siliconangle.com/ Cloud identity access management company Okta Inc. today revamped its developer experience with features that include new integrations and documentation in a general release that’s free for up to 15,000 monthly active users. The updates are part of Okta’s new Starter Developer Edition that will provide developers tools to embed the company’s Okta authentication, authorization and user management into enterprise cloud applications at scale. The company announced the product revamps during the first day of Oktane21, the company’s three-day

Read more

Application security testing in an age of continuous development

Source:-https://techhq.com/ Web application security testing techniques have changed significantly since waterfall development methodologies lost popularity and the advantages of an agile approach to software development started to hold sway. Testing has had to become as iterative as the continuous development & integration methods of modern app development. In environments with multiple web properties, the automation of such testing is now a commonplace necessity. Sure, manual testing still exists — and there are excellent arguments for engineers to pore through lines

Read more

Four reasons why application delivery is critical to DevOps

Source:-https://itbrief.com.au The move to continuous integration/continuous deployment (CI/CD) and agile development methodologies means that application development now requires network IT operation teams (NetOps) and security operation teams (SecOps) to work together, which puts increased stress on developers and engineers. Add heterogeneous computing environments to the mix, and it’s no wonder that the role of application delivery and security within DevOps has never been more onerous. Selecting an application delivery solution that maximises automation and integrates into an existing DevOps environment

Read more

Using Machine Learning and Kubernetes Logs to Automate Security Threat Detection

Source:-https://containerjournal.com Kubernetes is quickly consolidating its place as the leading container orchestration platform for cloud-native applications, with adoption at 59% among enterprise IT professionals as of March. But while Kubernetes delivers agility, flexibility and scalability for DevOps teams, it also creates complexity that can be an enigma for SecOps teams—especially when something goes wrong. When it comes to detecting threats and tracking down breaches in Kubernetes, security teams’ key asset is the Kubernetes API server audit log. The audit log

Read more

Eficode Recognized In Gartner Hype Cycle For Agile And DevOps, 2020ource

Source:-aithority.com Eficode, Europe’s leading DevOps company, has been recognized in Gartner’s Hype Cycle for Agile and DevOps, 2020 (1) . The Hype Cycle report includes key approaches and technologies used to support a DevOps initiative. Eficode was recognized in the Gartner report as a Sample Vendor of DevOps Value Stream Management Platforms [VSMP], the report states “they provide visibility and traceability to every process in software delivery – from ideation through development to release and production, and extending to documenting

Read more

The security silo: How to better integrate DevOps and security teams

Source- siliconrepublic.com Rapidly maturing DevOps teams are breaking boundaries, strengthening processes and building products at a faster pace with each iteration. This, seemingly, is a win for everyone. DevOps teams have a continuous opportunity to perfect their processes with each release; leadership sees deadlines being met and exceeded; and end users get faster, more reliable improvements to the apps and software they use daily. Overall, efficiencies almost always mean a healthier bottom line, and the adoption of DevOps practices is often

Read more

DevOps thinking means service-centric security

Source – jaxenter.com Unless you are a stunt professional, you need four round wheels on a car to make it roll. The same goes for today’s business-critical services, with their range of ephemeral services interacting with virtual and physical systems. A failure of any inter-related service element will destroy the digital experience that the line of business is banking on. Instead of DevOps delivering promised agility, it increases friction with new points of blindness and breakage. DevOps models spin up microservices,

Read more

When DevOps And SecOps Collide: How To Improve Collaboration To Enable Agility

Source – forbes.com There are two kinds of companies today: the ones that are in the cloud and ones that will be in the cloud. The gravitational pull fueled by agility, cost and resource management cannot be resisted. Today’s digital transformation is invigorating companies around the world to increase performance and drive more output. The rush to harness new digital technologies often results in enthusiastic business owners taking initiatives straight to the cloud, putting DevOps and SecOps at odds by allowing

Read more

DevOps the forgotten team when it comes to security: CyberArk

Source – zdnet.com Due to the dynamic nature of DevOps and the business “secrets” they have access to, security vendor CyberArk has highlighted the importance of ensuring these teams are protected from the threat landscape. According to Jeffrey Kok, senior director of solution engineering for Asia Pacific and Japan at CyberArk, exposing DevOps to the elements means privileged account credentials — such as SSH keys, API keys, and other credentials — are proliferating throughout IT infrastructure at a rapid-fire pace, creating

Read more

DevOps and SecOps began as separate efforts

Source – csoonline.com Until today, anti-fraud, security and authentication activities in organizations have operated as largely-separate domains, with IT Ops even more separated, in most cases. This is due, in part, to the “silo mentality” in enterprises, where it’s more convenient to have a bunch of teams running their own disciplines. After all, collaboration and synchronization increase the degree of difficulty. Politics, momentum, status quo, and decentralized operations that use third-party providers are also contributing to the current operational division. Given

Read more

DevOps and SecOps: The Perks of Collaboration

Source – csoonline.com A quick search on the term DevOps shines a very telling light on where people see the value in this practice. Some proponents see DevOps as a faster path to market. Some feel that DevOps encourages faster innovation. Others suggest that entire organizations can literally move faster by virtue of using DevOps for product development. And still others who even think DevOps is TOO fast. Clearly, it’s all about speed, baby. There’s nothing wrong with getting things done

Read more

5 Tips to Streamline Your Security Team

Source:- business2community.com If you’ve ever hired security pros, then you know the current talent shortage is no joke. A recent Computerworld survey found that compensation for security specialists is growing faster than for any other role in IT (up 6.4% year-over-year in average total compensation), and the competition for talent is fierce. Finding the right talent can be a lengthy process, leaving your security hopes and dreams in limbo. So, what’s an organization to do? Many companies are working hard

Read more