Glen Knight

NYC Based IT Professional

How Third-Party Security Assurance Enhances DevSecOps

Enterprises are constantly trying to do more with less today, and do it faster to gain competitive advantages and grow revenue. Nowhere is this more prevalent than in their internal software development processes. The movement to third-party or external sources of code is a natural reaction to “faster” release cycles. However, this need for speed […]

0 Comments

Read More

Foundation Proposes Advancing eBPF Adoption Across Multiple OSes

The eBPF Foundation, which proposes to advance adoption of an approach that enables sandbox programs to run faster at the kernel level, is being launched today as an arm of the Linux Foundation. The technology known as eBPF was originally developed for Linux. The eBPF Foundation is now committed to expanding use of eBPF across […]

0 Comments

Read More

Real-Life BDD: Getting the Best Out of Dev Teams

If we want our software to have value, we need to improve it every day, rather than wait three months for the next release. If someone finds a bug and we know how to fix it, we want to deliver the fix that day. The challenge is deploying to production many times a day. If […]

0 Comments

Read More

Choosing an Incident Management Platform

When you’re feeling the stress and pain of manually managing incidents and incident response, making the decision to find an incident management tool is a no-brainer. But how do you choose the one that will work best for you, your team and your business? You might be asking yourself, “Where do I start? What do […]

0 Comments

Read More

Trust and Authority

The post Trust and Authority appeared first on DevOps.com. Source: DevOps.com

0 Comments

Read More

Google Unveils Tool to Better Secure GitHub Repos

Google today launched a GitHub app that provides automated continuous enforcement of security best practices for GitHub projects. Kim Lewandowski, a product manager for open source software security at Google, said the Allstar application enables IT teams to assess any project on GitHub to check for security policy adherence. In addition, Allstar sets desired enforcement […]

0 Comments

Read More

DataOps vs. DevOps: What’s the Difference?

There is a mindboggling amount of data today; to even measure it requires using a byte measurement called a zettabyte, which is one sextillion bytes (that’s 21 zeros). Currently, because such a ridiculous amount of data exists, there is a growing urgency to end wasteful data processes. From this environment, DataOps was born. Similar to […]

0 Comments

Read More

Programming Languages: Choose Wisely?

We’ve got decades of experience in programming and language adoption under our belt at this point, and there are a few things we can say definitively that developers in general (and DevOps engineers specifically) should be aware of. First, it doesn’t matter as much as you think. It really doesn’t. Most developers don’t choose programming […]

0 Comments

Read More

Datadog Cloud Security Platform Advances DevSecOps

Datadog has launched a Datadog Cloud Security Platform that promises to advance DevSecOps by identifying potential threats using the same agent software many DevOps teams already rely on to instrument applications. Renaud Boutet, senior vice president of product for Datadog, said organizations that rely on the Datadog software-as-a-service (SaaS) platform can now more easily invoke […]

0 Comments

Read More

Securing Microservices Vs. Monolithic Apps

New requirements for Securing Microservices Vs. Monolithic Apps Enterprises are migrating from monolithic applications to microservices, hoping to accelerate software deployment and improve scalability. Security is sometimes glossed over in these transitions. Simple best practices like authenticating users and using SSL are still important to follow. But teams need to think through important differences between […]

0 Comments

Read More