days
0
-74
-4
hours
-2
-1
minutes
-2
-9
seconds
-2
-7
search
Interview with Jeff Williams, CTO and Co-founder at Contrast Security

“High-profile application attacks have continued and perhaps ramped up”

Jeff Williams, CTO and Co-founder at Contrast Security, answered our questions about application security, the newest executive order in the US, where vulnerabilities are most likely to occur, and more. Learn more about the Contrast platform and how it works to ensure software security.

Secure your greatest asset

Tips to Keep Your Data Safe from Increasing Cyberattacks

The increasing cyberattacks on businesses only mean that it is time to secure your company to keep data safe. With these tips provided, you can stay away from online threats that disrupt business operations. Preventing data breaches will definitely keep companies out of trouble.

Alternative to traditional thinking

Why you should consider a Databaseless architecture

In this article Raja Rao, Head of Growth Marketing at Redis discusses breaking down complex problems using first principles and DBLess (databaseless) architecture. DBLess architecture provides an alternative to traditional thinking. Should you try a proof-of-concept?

Profile: Dr. Anna Hilsmann, group leader "Computer Vision & Graphics" at the Fraunhofer Heinrich Hertz Institute (HHI) in Berlin

Women in Tech: “Awareness of diversity and gender parity is growing”

Four years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Dr. Anna Hilsmann, group leader “Computer Vision & Graphics” at the Fraunhofer Heinrich Hertz Institute (HHI) in Berlin.

Interview with Bryan Patton, CISSP and Quest Strategic Systems Consultant

“The average downtime due to a ransomware attack is 21 days”

Malware is every company’s worst nightmare and in 2021, cyberattacks are on the rise. We spoke with Bryan Patton, CISSP and Quest Strategic Systems Consultant about ransomware, how to protect your team against it, what to do after an attack, and why we’ve seen a spike in ransomware.

What does modernization actually mean in practice?

Cloud-Driven Data Modernization

There’s an inescapable logic to data modernization, given that the cloud offers you new ways to deploy, distribute, and access your data. If you want to exploit those capabilities, your applications and data storage will change. There couldn’t be a better time to modernize your data models to match their new environments.

Interview with Sagi Rodin, Frontegg

“We are in the early stages of a huge shift away from building SaaS product capabilities in-house”

We spoke with Sagi Rodin from Frontegg about the challenges that SaaS companies face with ever increasing security threats and rising expectations from customers for greater control, freedom and independence. Sagi also talks about how utilizing easily integrated, full stack product capabilities can help solve this by allowing startups to keep focused on their core product, and launch faster with a more mature offering.

Security versus convenience

Please stop sharing your private keys

The battle between security and convenience is a trade-off that users, system administrators, security professionals and CISOs have to make every day. This is a particularly big problem for software developers and DevOps teams who commonly opt for the convenient solution of sharing private keys between one another.

Catch the early bird special until September 23

DevOpsCon 2021 early bird special: Attend remotely or in Munich!

DevOpsCon gives you the opportunity to learn about the latest tools and technologies. Seasoned experts will share insights on Continuous Delivery, microservices, containers, Kubernetes, security, cloud and lean business, and more. Attend DevOpsCon in Munich or remotely, from wherever you are.