Glen Knight

NYC Based IT Professional

IT Professionals Have Mixed Emotions About AI

A JumpCloud survey revealed IT pros are excited about the potential positives of AI, but also realize the possible negative security implications. Source: DevOps.com

0 Comments

Read More

Squaring the Circle: How to Make Public APIs Private

Many API attacks are effectively zero-day, novel attacks that exploit recent and unique changes to specific APIs. Here’s how to stop them. Source: DevOps.com

0 Comments

Read More

Data Gravity Will Remain an Issue

Don MacVittie explains we’re in the ‘dream world’ of data – where the cloud-native stack realizes the dream of portable programming. Source: DevOps.com

0 Comments

Read More

Legit Security Adds Sensors to Detect Usage of Gen AI Tools to Write Code

Legit Security updated its ASPM platform with the ability to detect when developers use generative AI tools to write code. Source: DevOps.com

0 Comments

Read More

Akamai Launches Gecko Edge Computing Services

Akamai’s Gecko initiative promises to make it simpler to centrally manage and deploy application workloads on edge computing platforms. Source: DevOps.com

0 Comments

Read More

The Practicalities of Open Sourcing

If you’re contemplating the daring act of open sourcing your projects, here are some things to know before you set out. Source: DevOps.com

0 Comments

Read More

Improve Efficiency With Smaller Code Reviews

Breaking down code reviews into more manageable portions can yield great benefits including efficiency, security and accuracy. Source: DevOps.com

0 Comments

Read More

Perceptions and Presentations

Source: DevOps.com

0 Comments

Read More

Survey: Cyberattacks Aimed at Software Supply Chains are Pervasive

A survey found the vast majority of respondents work for organizations that experienced a software supply chain incident in the past 12 months. Source: DevOps.com

0 Comments

Read More

The Code Caveat: When Developer Credentials Become the Hacker’s Pickaxe

Quiz #19 was: One morning, you receive an alert about unusual activity within your cloud environment. Upon investigation, you discover that a malicious actor has gained access to your company’s cloud resources and deployed a cryptocurrency mining script, siphoning off valuable computing power. After tracing the breach, you realize the attacker infiltrated the system using […]

0 Comments

Read More