Using a serverless content management system (CMS) should ensure that developers can concentrate on what they are there to do – write code. It can remove the burden of running back-end infrastructure and let other teams manage the content that is put in place.
Four years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Vrushali Prasade, Chief Technology Officer & Co-Founder of Pixis.
Threat hunting, like all cloud security, is rendered additionally difficult by high volumes of transactions and the high velocity of deployments. Security professionals face constantly evolving landscapes as their company infrastructures change and cloud providers offer new tools. While standard and cloud threat modeling share basic methodologies and joint purposes, there are meaningful differences.
We spoke with Paul Farrington, CPO at Glasswall about Content Disarm and Reconstruction technology, how it is used, and how it helps against file-based threats. Paul gives his advice regarding security measures, file-based threats, and how developers can best achieve top-notch security practices.
In this article, organisational psychologists, consultants and co-founders of award-winning Monkey Puzzle Training and Consultancy Karen Meager and John McLachlan discuss burnout mental health in tech. How can burnout be avoided and what are the warning signs?
Four years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Agata Nowakowska, Area Vice President EMEA at Skillsoft.
What is the current state of enterprise open source, and how has this been changed with the pace of digital transformation? This article looks at Red Hat’s State of Enterprise Open Source report and digs into the top trends in the enterprise open source community during this time of change and growth.
It’s no secret that DevSecOps with its speedy delivery and reduction in risk can accelerate the pace of digital transformation. In this article, Michelle Sebek, Senior Product Marketing Manager at Progress discusses the role of DevSecOps in digital transformation and policy-based DevSecOps automation architecture.
Four years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Elise Morse, Vibration Analyst at Augury.
With new technologies like AI, opportunities have emerged to adopt facial recognition in a variety of different domains. Today, there are many success stories where AI has provided reliable and accurate face recognition technology. This article examines some of its potential use cases.
In this article, Mike Nelson is the VP of IoT Security at DigiCert, discusses Secure By Design and IoT security after DevOps. The IoT needs to be Secure By Design – it’s an oft-repeated and fundamental best practice for IoT security. However – it’s not enough. Secure By Design is a necessary but insufficient step to reach the goal of a secure IoT.
Aviad Mizrachi, the co-founder and CTO of Frontegg, spoke with JAXenter about users changing expectations from modern applications and the challenges that developers face when bringing a product to market. He described Frontegg’s approach to unlocking innovation with its user management infrastructure and the efforts the company has taken to ensure a stellar Developer Experience. Aviad provided some tips for developers and users to prevent hacks and leaks, and offered some advice on finding the middle ground between simplicity and robustness.
This article examines GitOps in a real-world environment with issues and lessons on improving performance metrics for developers. GitOps provides an essential framework for DevSecOps, for security checks that extend throughout CI/CD, as well during the post-deployment stages of application management on Kubernetes clusters.
Four years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Hamida Rebaï Trabelsi, Senior Cloud Application Architect at Revenu Quebec.