March 19, 2024
Pete Goldin

Cloud development environment (CDE) adoption is growing adopted rapidly, despite the fact it is an emerging technology, according to The Cloud Development Environment Adoption Report from Coder ...

March 18, 2024

Nearly three-quarters of commercial codebases assessed for risk contain open source components impacted by high-risk vulnerabilities, representing a sharp uptick from the previous year, according to the Open Source Security and Risk Analysis (OSSRA) report from Synopsys ...

March 15, 2024

In Episode 52 of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler from EMA present Security 101 Basics: Microsegmentation ...

March 14, 2024

While security is a top priority for developers, they are facing an uphill battle when it comes to time spent chasing vulnerabilities, the available scanning tools and alignment with security teams, according to the Developer Survey Report from Qwiet AI ...

March 13, 2024

The number and severity of API attacks and vulnerabilities are increasing according to the API ThreatStats™2024 Report from Wallarm — there was a 30% increase in API-related Common Vulnerabilities and Exposures (CVEs) and security bulletins in 2023 compared to 2022 ...

March 12, 2024
Thomas Graf

eBPF is a technology that allows users to run custom programs inside the Linux kernel, which changes the behavior of the kernel and makes execution up to 10x faster and more efficient for key parts of what makes our computing lives work. That includes observability, networking and security ...

March 11, 2024
Ernie Hu

Capturing institutional knowledge and insight into the mechanics of custom-built software has unique challenges. No two programmers think exactly alike, so documenting software development and coding changes is essential to keep products running. When a developer leaves or is let go, the remaining development team must rely on notes and documentation to understand their code structure ...

March 08, 2024

In Episode 51 of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler from EMA discuss third party identity providers ...

March 07, 2024
Dotan Nahum

Sometimes, the most effective method of protection is to put yourself in the attacker's shoes so you can stay one step ahead of their next move. The same is true for penetration testing — If you can't beat 'em, join 'em ...

March 06, 2024
Ajay Kumar Mudunuri

DevOps acts as an enabler when taking an application modernization approach ... As businesses evolve, embracing DevOps principles will be the cornerstone of their successful application modernization journey. These will ensure their software remains robust, secure, and user-friendly in the face of technological advancements and market demands. This blog explores the role of DevOps in application modernization ...

March 05, 2024
Christopher Hendrix

Policy as code is being explored by the industry as an alternative or expansion upon the long-term standards of role-based access control and entitlements. With policy as code, policies can be managed and automated using code written in a high-level language. It is a programmatic method of uniformly defining and enforcing policies throughout cloud native applications and their infrastructure ...

March 04, 2024
Jim Remsik

Small software design and development shops, those with less than 25 employees, operate differently from large sized operations with hundreds upon hundreds of staff. Small shops are nimble, often close knit, and employees are usually led directly by senior, hands-on practitioners. Still, faced with lesser budget and resources, small shops must constantly be on the lookout for ways to maximize teams. The following four tips can help owners and leaders fine tune their operations for greater performance, cost efficiency, profitability and employee satisfaction ...

March 01, 2024

In Episode 50 of the Cybersecurity Awesomeness Podcast, Chris Steffen and Ken Buckler from EMA discuss supply chain security concerns and revisit the latest CMMC guidance ...

February 29, 2024
Lauren Hanford

Open source code is the bedrock of modern application development. Many applications are built almost entirely from open source components ... So what should you be looking for when making open source package choices for your applications? Here are ten critical questions to ask yourself before using an open source project ...

February 28, 2024

As organizations continue to navigate the complexities of the digital era, which has been marked by exponential advancements in AI and technology, the strategic deployment of modern, practical applications has become indispensable for sustaining competitive advantage and realizing business goals. The Info-Tech Research Group report, Applications Priorities 2024, explores the following five initiatives for emerging and leading-edge technologies and practices that can enable IT and applications leaders to optimize their application portfolio and improve on capabilities needed to meet the ambitions of their organizations ...

BIZDEVOPS Blog

March 19, 2024
Pete Goldin
DEVOPSdigest
March 06, 2024
Ajay Kumar Mudunuri
Cigniti Technologies
February 08, 2024
Dave Laribee
Nerd/Noir
January 17, 2024
Jim Remsik
Flagrant
January 02, 2024
Chris Steffen and Ken Buckler
Enterprise Management Associates (EMA)
November 07, 2023
Surjeet Singh
Benefitfocus
November 02, 2023
Helen Beal
Value Stream Management Consortium
October 18, 2023
Nate Berent-Spillson
Launch by NTT DATA
October 10, 2023
Pete Goldin
DEVOPSdigest
June 07, 2023
Jeremy Jackson
Shift Lab

Vendor Forum

March 07, 2024
Dotan Nahum
Check Point Software Technologies
February 27, 2024
Salman Khan
LambdaTest
February 26, 2024
Kenn Hussey
Ambassador Labs
February 21, 2024
Stephen Feloney
Perforce Software
February 20, 2024
John Campbell
Security Journey
February 14, 2024
Shay Levi
Noname Security
February 07, 2024
Jori Ramakers
Tricentis