Related Content
Choosing the Right Threat Modeling Methodology Threat modeling has transitioned from a theoretical concept into an IT security best practice. Choosing the right methodology is a combination of finding what works for your SDLC maturity and ensuring it results in the desired outputs. Let’s look at four different methodologies and assess their strengths and weaknesses. |
||
Helping People Respond to Change Why do people respond differently to change? There are lots of possible reasons, and the degree to which people embrace or reject change also varies greatly. But if your company is going through a change and some employees interpret it as significant, it doesn't matter what you think of it—you have to help them deal. |
||
Build Better Teams by Finding Hidden Talents We’re not all created equal, and it’s counterproductive to act like that’s the case on a team. Every individual has their own unique set of strengths, and knowing what everyone’s strengths are contributes to the team’s success. When you're putting a team together, you first have to discover each person’s strong suits. |
||
Shifting Security Left in Your Continuous Testing Pipeline Security is often the black sheep of testing—an afterthought that gets only a scan before release. We have to make security a first-class testing citizen with full-lifecycle support. For the best impact, introduce security testing into the early phases of the continuous testing pipeline. Here are some tools to help. |
||
Building a DevOps Army As you scale DevOps, you need more team members who understand the fundamentals. You could bring in external folks, but they're expensive and in short supply, so start building your DevOps army now by training existing employees. Here's what testers, developers, and IT operations professionals each need to know. |
||
Cybersecurity Consciousness during COVID-19 As we all deal with COVID-19 across the globe—medically, economically, and professionally—there are plenty of lessons to discover. There is also a lot to learn when it comes to cybersecurity. More people moving toward working from home means more opportunities for hackers to strike, so we must be smart and vigilant. |
||
Best Practices of the DevSecOps Elite: A Slack Takeover with DJ Schleen Thought leaders from the software community are taking over the TechWell Hub to answer questions and engage in conversations. DJ Schleen, a DevSecOps advocate, hosted this Slack takeover and discussed all things DevSecOps, including challenges to integrating security into your practices and getting management support. |
||
Cybersecurity Tips for Project Managers A project manager must be aware of the dangers the software faces if they are to be effective in its defense while managing their project. A lot of the data they're dealing with can be extremely sensitive. Let’s look at some tips that every project manager should pay attention to in order to protect their project. |