Enhanced firewall integrates with Azure and DevOps tools

Source – betanews.com Cloud security specialist Barracuda Networks is announcing enhancements to its firewall products to help customers speed up Microsoft Azure adoption and become cloud ready. Barracuda NextGen Firewall and Barracuda Web Application Firewall (WAF) both now integrate with Microsoft Operations Management Service (OMS). A Barracuda WAF specific dashboard is now available in the Azure Marketplace, making it easy for administrators to take advantage of this integration. NextGen Firewall also includes advanced SD-WAN capabilities to provide secure, optimized WAN connectivity from on-premises

Read more

How Outsourcing Can Mitigate Cyber risks in DevOps

Source – it-cisq.org DevOps agility requires organizational adjustments and additional tooling to ensure cybersecurity. At the same time, the challenges of the cybersecurity labor market drive the need to increase tooling’s impact and to consider outsourcing. In turn, these require carefully focusing on cybersecurity governance, including the assignment of accountability and responsibility. In DevOps, the business is in the driver’s seat. DevOps characteristics (such as iterative prioritizing and deployment) plus the combined responsibility for development and operations present cybersecurity risks. They

Read more

Increased automation helps organizations succeed: new DevOps report

Source – itworldcanada.com The highest performing organizations will have already automated the majority of their business, according to the results of a new report by US-based automation software provider Puppet. Its “State of DevOps” report, conducted in partnership with DevOps Research and Assessment (DORA), and co-sponsored by Amazon Web Services (AWS), Hewlett-Packard Enterprise (HPE), Deloitte, Australian software development firm Atlassian, US-based DevOps company Electric Cloud, intelligent data analysis corporation Splunk, and Canadian IoT innovator Wavefront, found that successful businesses have automated 72

Read more

The changing face of security in the age of the cloud

Source – cloudcomputing-news.net The computing world just keeps on progressing but as we all know with progress comes additional challenges. This is especially true of challenges around security. Every advance in computing has given rise to the same question: “how do we secure this new toy?” When client/server architecture was all the rage in the late 1990s there was great excitement about the advantages it brought about but also a concern for the security implications of distributed clients and centralised servers.

Read more

Database DevOps contradictions snarl enterprise IT automation

Source – searchitoperations.techtarget.com For many companies, the words database DevOps present a contradiction in terms. Database DevOps initiatives occur in two areas of a company’s IT automation pipeline — the preproduction test bed and the production deployment process. And both environments raise their own set of tricky technical questions. In DevOps for database test environments, organizations must quickly spin up system clones to offer data that accurately reflects the production environment, while protecting sensitive corporate information. On the other hand, database changes in

Read more

Snapshot management tool adds intelligent data management

Source – searchstorage.techtarget.com When talking about snapshots, I usually focus on the application or the data replication method of addressing the shortcomings of traditional backup in data protection and disaster recovery planning. Depending on who you ask, however, snapshots are either a boon or a bane. We cheer snaps when they simplify backup, replacing the time-consuming process of replicating data on a file-by-file or row-by-row basis to a target volume. Creating snapshots has certainly become faster and more flexible, with the latest evolution

Read more

10 ways to protect your data on the AWS platform

Source – cloudcomputing-news.net One of the worst data breaches in US history recently made the headlines, and it’s a powerful reminder of the importance of protecting data on platforms such as Amazon Web Services (AWS). The personal details of nearly four out of every five adult Americans, including virtually every registered voter, were recently exposed online thanks to sloppy security practices. The data not only included contact details and birth dates, but also information on the perceived political views of individuals. Media analytics

Read more

Automation is not DevOps

Source – dev.to A few years ago, if you would have asked me to define DevOps, my answer would have sounded something like “Mumble mumble automation, mumble, automation, mumble mumble, infrastructure-as-code, mumble mumble, strategery.” Thinking that DevOps equated to automation had mostly to do with the fact that most of the DevOps people I talked to and articles I read really only spoke about automation with only indirect references to anything else. Implementing automation is definitely a part of what it

Read more

How will the cloud change IT? Look at Microsoft

Source – infoworld.com Microsoft is planning a global sales reorganization to better focus on selling cloud software, according to Microsoft insiders. This comes as no surprise, considering that Microsoft did the same for its ailing phone business last year. What does this mean? Well, cloud in, software out—at least from the Microsoft business standpoint. However, count on Microsoft soaking you for more operating system and office automation money for years to come. So, that’s still a thing. What does this mean to you,

Read more

DevOps is failing these three tenets of privacy compliance

Source – sdtimes.com If you’re like many organizations with data security concerns, you probably believe your automated tests are sufficient to catch any potential security or privacy vulnerabilities. The scenario is familiar: You’re streaming data from multiple sources into your SEIM systems, and you’ve configured triggers for the reporting process. You keep a close eye on results from automated tests on software running in production. All of your monitoring tools indicate your code is running flawlessly and there are zero errors.

Read more

IT Security Practices Being Eyed Earlier in App Development: Study

Source – windowsitpro.com In the past, IT security in the application building process has often been addressed as an after-thought, usually brought up at the last minute, just after the desired application and code were created. Since 2014, however, that frequent pattern has been changing as more security emphasis is apparently being brought into application development earlier in its creation, according to a recent DevSecOps study on enterprise security practices, released by Sonatype. The report, the 2017 DevSecOps Community Survey, found that in 2014, the last time

Read more

3 Career Paths Software Developers Might Want to Pursue

Source – informationweek.com Not every senior developer is cut out to be a manager. In fact, many aren’t. That’s not a dig at developers. Rather, it’s a recognition of the role’s nature. Many programmers select the field because they want to be individual contributors, not managers. Even those interested in mentoring others — say, as a software architect or lead developer — may not want to be a developer manager. Yet, either by external or internal pressures, top software developers are

Read more

How to build a DevOps center of excellence: 4 steps

Source – enterprisersproject.com For leaders seeking to transition IT teams from traditional, waterfall-style development to a DevOps approach, culture shock danger looms large. How do you make such a deeply transformative change without causing severe disruption? One answer is to create a center of excellence within your organization, where a DevOps approach has the chance to start small, and then grow and flourish as the approach proves itself, says Kevin Baril, technology strategy & management principal at advisory firm Grant Thornton. “Your business

Read more

Are DevOps and Application Security Compatible?

Source – simpleprogrammer.com DevOps is the word of the year. The software industry is on fire with the DevOps craze and more and more companies are looking for DevOps skills. DevOps practices are the key to delivering value quickly, scaling effectively, and enabling a fast feedback cycle of important information. They allow the true agility in software development that companies need to be successful. Good application security practices help to prevent the misuse of software for nefarious means. It aims to protect

Read more

The Future of IT Skills for Technical Support Organizations

Source – dqindia.com Over the past few years, digital transformation has become a watchword for many businesses. In this new era defined by cloud computing, social media and mobile strategies, companies are pursuing new IT tools, and it is clear that the best use of tools require a disruption to operational procedures. Accompanies seek success with new products and new customers; there are many areas that must be addressed in order to become a truly digital service provider. One of the

Read more

6 Macro Disruptors That Will Change Information Technology

Source – techtarget.com Change is a good thing in the long run, but change can really suck while you’re experiencing it.  Right now, six (6) macro phenomena are changing the practice of Information Technology.  These changes provide both opportunities for new solutions to enter the marketplace, but also threaten the status quo – and the leaders therein.  Whether you are responsible for the success of new technologies that offer revolutionary new capabilities or are tasked with positioning your existing technology in

Read more

How to tackle changing cloud security threats: A guide

Source – cloudcomputing-news.net IT workers face a serious challenge when it comes to file sharing. In one corner is corporate governance which seeks to protect businesses and prevent cyber-attacks. In the opposite corner are end users who want to work more efficiently – collaboratively – by sharing or saving files. The best way of ending this conflict is to find middle ground. In attempting this resolution, enterprises need to find the right balance between IT security and governance on one side

Read more

The latest cyber attacks show why the cloud is safer

Source – infoworld.com Computer systems from the Ukraine to the United States were affected last week by the Petya cyber attack. It’s similar to the recent WannaCry ransomware attack last month. The WannaCry ransomware took advantage of vulnerabilities in the older versions of Windows that allowed the infection to spread. All someone needed to do was click a malicious link and—bang!—they were infected. That is, if they hadn’t installed the patches and updates. These attacks are a reminder of why the cloud is a

Read more

Java DevOps provides Agile path to continuous delivery success

Source – theserverside.com Every enterprise wants to make IT more responsive to user needs, and at the same time make development and deployment more efficient and fail-safe. Java is the most popular programming language, and it offers much to support these goals. The challenge is making all the various strategies work together. To do that, divide Java projects and continuous delivery capabilities by stage of impact, explore state-of-the-art approaches in each stage, and use project-level practices to tie all the pieces

Read more

Cloud native adoption means getting the DevOps tooling right

Source – theserverside.com There’s no debate over the fact that a cloud native architecture using DevOps tooling can work. Eliminating the wheel and spoke architecture where the massive monolith sits in the middle, and instead approaching software design by using DevOps tooling with a focus on serverless functions, stateless processes, isolated microservices and container based deployments has definitively been proven to work. But getting cloud native and DevOps tooling to work at scale isn’t easy, and the vast number of different pathways

Read more
1 145 146 147 148 149 169