Glen Knight

NYC Based IT Professional

Armory Aims to Turn Continuous Delivery Into a Service

Armory this week made generally available a continuous delivery-as-a-service (CDaaS) offering that promises to make it simpler for a much wider range of organizations to programmatically deploy applications. The Armory Continuous Deployment-as-a-Service platform has been available in beta since March. It differs from Armory’s existing open source Spinnaker continuous delivery (CD) platform in that it […]

0 Comments

Read More

Improving Observability With ML-Enabled Anomaly Detection

Nowadays, DevOps and SRE teams have many tools to access and analyze logging data. However, there are two challenges that prevent these teams from resolving issues in a timely manner:  They aren’t equipped with all the data they need Detecting and resolving issues is reactive and manual In this article, I’m going to break down […]

0 Comments

Read More

Threat Modeling as a DevSecOps Practice

Software engineers are always under pressure to build more software, faster.  At the same time, there is increasing regulatory and market pressure for secure software that meets users’ and regulators’ requirements for data privacy.  This dynamic often puts software engineers at odds with application security or product security teams. In fact, 81% of developer teams […]

0 Comments

Read More

The Poetics of Code

The post The Poetics of Code appeared first on DevOps.com. Source: DevOps.com

0 Comments

Read More

TechStrong Con 2022: Exploring What’s Next in Tech

We have become increasingly reliant on technology and it’s hard to imagine life without all the great tech inventions we use in our daily lives. As technology keeps progressing, more is expected of IT teams, and security is a top priority. While we are still trying to get used to the new normal, the IT […]

0 Comments

Read More

Cloud Giants Shun Wind Power? | LaMDA not Sentient? | MS IE RIP?

In this week’s The Long View: Warren Buffett asks too much for wind energy, it’s “completely ridiculous” to say Google’s chatbot LaMDA is sentient, and Microsoft finally kills Internet Explorer. The post Cloud Giants Shun Wind Power? | LaMDA not Sentient? | MS IE RIP? appeared first on DevOps.com. Source: DevOps.com

0 Comments

Read More

How to Securely Manage Secrets Within Jenkins

The continuous integration and continuous delivery (CI/CD) pipeline is a fundamental component of the software delivery process for DevOps teams. The pipeline leverages automation and continuous monitoring to enable seamless delivery of software. With continuous automation, it’s important to ensure security for every step of the CI/CD pipeline. Sensitive information like access credentials is often […]

0 Comments

Read More

Survey Surfaces Raft of Application Security Issues

A global survey from ReversingLabs found 87% of respondents agreed that software tampering has become a more frequently-used cybersecurity attack, but only 37% said they have any means to detect it. The survey, which polled 300 IT and security professionals, was conducted by Dimensional Research on behalf of ReversingLabs, a provider of a platform for […]

0 Comments

Read More

Let Me Reiterate – Don’t Rush to Iterate

We in the DevOps world spend an inordinate amount of time talking about tools and roles—and there are always new tools and modifications of roles to talk about. Do you know what we don’t discuss as an industry? The day-to-day grind of being in DevOps. Oh, you can go to forums like Reddit and have […]

0 Comments

Read More

Jit Emerges to Address Cybersecurity Policy-as-Code Orchestration

Jit today emerged from stealth with a free namesake orchestration platform beta that automatically implements security plans as code. Aviram Shmueli, chief product officer for Jit, said the company will both make security plans it developed available as code within GitHub. In addition, Jit will make available a service through which customers can submit documents […]

0 Comments

Read More