Glen Knight

NYC Based IT Professional

TechStrong Con: Open Source Software Community Needs Security Help

The only way to make significant improvements in the state of open source security is if more organizations that benefit from open source projects commit to making more resources available to achieve that goal. At the virtual TechStong Con event, executives on an Open Source and DevOps panel called for more contributions from enterprise IT […]

0 Comments

Read More

Developer’s Guide to Web Application Security

When it comes to security, there are many vulnerabilities that can leave your website or web app open to attack. In this article, we’ll go over 15 common web application security vulnerabilities and how you can prevent them. 1. Insufficient Cryptography Cryptography is a critical security measure that is used to protect data in transit […]

0 Comments

Read More

Cloudflare Outage Outrage | Yet More FAA 5G Stupidity

In this week’s The Long View: Cloudflare suffers another huge outage while the FAA and FCC still disagree over 5G/NR near airports. The post Cloudflare Outage Outrage | Yet More FAA 5G Stupidity appeared first on DevOps.com. Source: DevOps.com

0 Comments

Read More

New – Amazon SageMaker Ground Truth Now Supports Synthetic Data Generation

Today, I am happy to announce that you can now use Amazon SageMaker Ground Truth to generate labeled synthetic image data. Building machine learning (ML) models is an iterative process that, at a high level, starts with data collection and preparation, followed by model training and model deployment. And especially the first step, collecting large, […]

0 Comments

Read More

Now in Preview – Amazon CodeWhisperer- ML-Powered Coding Companion

As I was getting ready to write this post I spent some time thinking about some of the coding tools that I have used over the course of my career. This includes the line-oriented editor that was an intrinsic part of the BASIC interpreter that I used in junior high school, the IBM keypunch that […]

0 Comments

Read More

ShiftLeft Report Reveals State of Application Security

A report published today by automated application security testing platform ShiftLeft found only one in three applications has an attackable vulnerability. The report also found organizations that prioritized their remediation efforts based on the level of actual threat are fixing 76% of those vulnerabilities within two sprints lasting 12 days, on average. Based on millions […]

0 Comments

Read More

Survey Sees Alternative Cloud Service Providers Gaining Ground

A survey of 458 development professionals, managers and senior leaders conducted by Techstrong Research, a sister entity of DevOps.com, found 43% are considering adding additional cloud service providers in the next 12 months. In total, nearly two-thirds said they are at least considering, evaluating or are ready to buy from a trusted alternative cloud vendor, […]

0 Comments

Read More

What the New OWASP Top 10 Changes Mean to Devs

The open web application security project (OWASP) recently updated its top 10 list of the most critical security risks to web applications after four years. It represents the most radical shake-up since the list was introduced in 2003. The changes will undoubtedly have a big impact on how businesses address application security going forward and […]

0 Comments

Read More

Survey Shows Correlation Between Open Source, DevOps Skills Demand

A survey published this week by the Linux Foundation suggested enterprise IT organizations now prefer to hire IT professionals that have both open source software and DevOps experience. Conducted in collaboration with edX, a leading global online learning platform from 2U, Inc., the survey polled 1,672 open source professionals and 559 respondents with responsibility for […]

0 Comments

Read More

Four Steps to Avoiding a Cloud Cost Incident

The recent Flexera 2022 State of the Cloud Report found that organizations waste 32% of their cloud spend, up from 3o% last year. This can be due to cloud cost incidents triggered by unused resources, malicious activity or overambitious projects and which have a massive financial impact if not found and corrected promptly. As an […]

0 Comments

Read More