At this point, the concept of DevOps should be familiar to everyone. But with the rise of cybersecurity attacks, organizations have seen the need to incorporate security into the mix. Thus, the idea of DevSecOps. Though the concept and practices were created with the best intentions, the number of cybersecurity attacks continues to rise, which … continue reading
Companies face a terrible choice. Either transform their business into software and accept rampant vulnerabilities and breaches, or lose the innovation race with their competitors. Companies always choose software – there will be 111 billion lines of new code written in 2017, according to a Cybersecurity Ventures report. And our traditional approaches simply aren’t anywhere … continue reading
In most organizations today, the most precious assets (if not the most precious asset) are their applications (and the data they handle). Yet those same organizations protect their applications only from the outside. “Imagine a person who leaves his house always surrounded by bodyguards, because he cannot protect himself. He doesn’t have the skills or … continue reading
In its 2015 report, the Open Web Application Security Project (OWASP) identified SQL injection and cross-site scripting among its Top 10 software vulnerabilities. Again. If it feels as if you’ve been reading this same story for the last decade, it’s because you have. So why is it that we can build intelligent robots, fling unmanned … continue reading