March 28, 2024

Over 80% of survey respondents indicated that a critical security issue in deployed software impacted their DevOps delivery schedule in the last year, according to theGlobal State of DevSecOps 2023 report from Synopsys ...

March 27, 2024

Software developers are showing an unprecedented surge of interest in generative AI, with topic engagement in GPTs — a family of artificial intelligence models — increasing 3,600% year over year, according to O'Reilly's Technology Trends for 2024 report ...

March 26, 2024

Security is taking a toll on productivity, according to the Software Supply Chain State of the Union report from JFrog. 48% of survey respondents said it typically takes a week or longer to get approval to use a new package/library, extending time to market for new apps and software update ...

March 25, 2024
Peter Schneider

Software developers probably don't need to worry as much as they think about GenAI taking their jobs. But they do need to think twice about which language model they use. In fact, the Large Language Model (LLM) space is seeing something of a code generation arms race. How do you know which one's right for you? ...

March 22, 2024

In Episode 53 of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler from EMA discuss the updated PCI DSS standards ...

March 21, 2024
Sandeep Hinduja

Low-code development has been around for some time but has gained traction in recent years with a remarkable surge in its market share ... Financial institutions are using low-code for process automation, data modeling and visualization, data security, building customer-engaging applications, and more. Let's explore how this technology drives innovation in the financial services industry ...

March 20, 2024
Dotan Nahum

Role Based Access Control (RBAC) is a method for regulating access to computer or network resources based on the roles of individual users within an organization. In RBAC, access permissions are grouped by role name, and access to resources is restricted to users who have been authorized to assume the associated role ...

March 19, 2024
Pete Goldin

Cloud development environment (CDE) adoption is growing rapidly, despite the fact it is an emerging technology, according to The Cloud Development Environment Adoption Report from Coder ...

March 18, 2024

Nearly three-quarters of commercial codebases assessed for risk contain open source components impacted by high-risk vulnerabilities, representing a sharp uptick from the previous year, according to the Open Source Security and Risk Analysis (OSSRA) report from Synopsys ...

March 15, 2024

In Episode 52 of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler from EMA present Security 101 Basics: Microsegmentation ...

March 14, 2024

While security is a top priority for developers, they are facing an uphill battle when it comes to time spent chasing vulnerabilities, the available scanning tools and alignment with security teams, according to the Developer Survey Report from Qwiet AI ...

March 13, 2024

The number and severity of API attacks and vulnerabilities are increasing according to the API ThreatStats™2024 Report from Wallarm — there was a 30% increase in API-related Common Vulnerabilities and Exposures (CVEs) and security bulletins in 2023 compared to 2022 ...

March 12, 2024
Thomas Graf

eBPF is a technology that allows users to run custom programs inside the Linux kernel, which changes the behavior of the kernel and makes execution up to 10x faster and more efficient for key parts of what makes our computing lives work. That includes observability, networking and security ...

March 11, 2024
Ernie Hu

Capturing institutional knowledge and insight into the mechanics of custom-built software has unique challenges. No two programmers think exactly alike, so documenting software development and coding changes is essential to keep products running. When a developer leaves or is let go, the remaining development team must rely on notes and documentation to understand their code structure ...

March 08, 2024

In Episode 51 of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler from EMA discuss third party identity providers ...

BIZDEVOPS Blog

March 19, 2024
Pete Goldin
DEVOPSdigest
March 06, 2024
Ajay Kumar Mudunuri
Cigniti Technologies
February 08, 2024
Dave Laribee
Nerd/Noir
January 17, 2024
Jim Remsik
Flagrant
January 02, 2024
Chris Steffen and Ken Buckler
Enterprise Management Associates (EMA)
November 07, 2023
Surjeet Singh
Benefitfocus
November 02, 2023
Helen Beal
Value Stream Management Consortium
October 18, 2023
Nate Berent-Spillson
Launch by NTT DATA
October 10, 2023
Pete Goldin
DEVOPSdigest
June 07, 2023
Jeremy Jackson
Shift Lab

Vendor Forum

March 25, 2024
Peter Schneider
Qt Group
March 21, 2024
Sandeep Hinduja
Newgen Software
March 20, 2024
Dotan Nahum
Check Point Software Technologies
March 07, 2024
Dotan Nahum
Check Point Software Technologies
February 27, 2024
Salman Khan
LambdaTest
February 26, 2024
Kenn Hussey
Ambassador Labs
February 21, 2024
Stephen Feloney
Perforce Software
February 20, 2024
John Campbell
Security Journey
February 14, 2024
Shay Levi
Noname Security
February 07, 2024
Jori Ramakers
Tricentis