Glen Knight

NYC Based IT Professional

How to Secure CI/CD Pipelines With DevSecOps

Many companies are adopting a DevOps approach in their workflows as IT moves toward a more automated and cloud-native world—but for some industries, this migration isn’t easy. Many of these companies—in finance, health care, government—are obligated to meet compliance requirements. For these organizations, DevSecOps adds necessary security focus to the DevOps methodology. Compliance means adhering […]

0 Comments

Read More

The COVID-19 Pandemic’s Lasting Impact on Tech

The COVID-19 pandemic created major opportunities for innovation and ushered in new technology solutions, but even as the danger subsides, this tech may still serve a purpose. Whether it be face mask detection, temperature checks, facial recognition or AI surveillance, technology crafted to combat COVID-19 is here to stay. This may present a number of […]

0 Comments

Read More

Update Those Ops Tools, Too

We’re all pretty well settled on the idea that the rate of change in IT has been on the increase over time. From the advent of VMs to Agile to DevOps to containers, the movement has been faster—and the same is true for internal development. I’m going to approach this topic from three perspectives instead […]

0 Comments

Read More

Red Hat Adds Managed Ansible Service on Azure

Red Hat today announced general availability of a managed instance of the Red Hat Ansible Automation Platform on the Microsoft Azure cloud. Announced at the Red Hat Summit 2022 event, this offering makes it possible to deploy the control plane for Ansible on the Microsoft Azure cloud as an alternative to existing support for Amazon […]

0 Comments

Read More

Agile/Scrum is a Failure – Here’s Why

In this week’s The Long View: Agile and Scrum are increasingly getting a bad reputation, being associated with the worst aspects of toxic workplace culture. The post Agile/Scrum is a Failure – Here’s Why appeared first on DevOps.com. Source: DevOps.com

0 Comments

Read More

Jamstack Will Revolutionize How Websites Are Built

Today, every organization wants a website that loads quickly and looks sharp. The reasons go much deeper than cosmetic motivations, though—even a slight delay in loading can cause users to exit a page prematurely and site performance plays an important role in search engine rankings. Meanwhile, threats like ransomware and phishing are everywhere and are […]

0 Comments

Read More

Does GraphQL Introduce New Security Risks?

The GraphQL query language is an excellent tool for increasing the ease of data sharing. The premise is that you request the fields you need in a single bundled request, avoiding multiple network calls. Due to its usability, GraphQL is a growing area of development. Yet, as with any new technology, it comes with caveats. […]

0 Comments

Read More

Semiconductor Shortage May Be Here to Stay

Intel CEO Pat Gelsinger has cautioned that the semiconductor shortage will last until 2024, a scary reality for manufacturers, businesses and consumers alike. Semiconductor chips, or microchips, are essential for many digital consumer products. Anything that processes information uses these chips and with the exponential growth of technology, there has been a massive increase in […]

0 Comments

Read More

OpenSSF Adds Open Source Package Analysis Tool Prototype

The Open Source Security Foundation (OpenSSF) has made available a prototype of a package analysis tool that has already identified more than 200 malicious packages uploaded to PyPI and npm software components. Caleb Brown, an OpenSSF maintainer of the project, said the goal is to understand the behavior and capabilities of packages available on open […]

0 Comments

Read More

Checkmarx Report Highlights Need for AppSec Collaboration

A research report published by Checkmarx finds the same basic malicious software developed using multiple programming languages as cyberattackers industrialize their malware development processes. Checkmarx, a provider of code scanning tools, shared examples of malicious packages written in multiple programming languages. These example packages share the same indicators of compromise that have gone undetected for […]

0 Comments

Read More