Related Content
Cybersecurity Consciousness during COVID-19 As we all deal with COVID-19 across the globe—medically, economically, and professionally—there are plenty of lessons to discover. There is also a lot to learn when it comes to cybersecurity. More people moving toward working from home means more opportunities for hackers to strike, so we must be smart and vigilant. |
||
Best Practices of the DevSecOps Elite: A Slack Takeover with DJ Schleen Thought leaders from the software community are taking over the TechWell Hub to answer questions and engage in conversations. DJ Schleen, a DevSecOps advocate, hosted this Slack takeover and discussed all things DevSecOps, including challenges to integrating security into your practices and getting management support. |
||
Cybersecurity Tips for Project Managers A project manager must be aware of the dangers the software faces if they are to be effective in its defense while managing their project. A lot of the data they're dealing with can be extremely sensitive. Let’s look at some tips that every project manager should pay attention to in order to protect their project. |
||
Google's Android App Bundle Is a Win for Developers and Users Google’s new Android App Bundle is a publishing format that offers a more efficient way for developers to build and release apps. It creates lean application APKs that are optimized for each device configuration, without refactoring. This means engineers need to code less, and users are happy to get a smaller download. |
||
Is There a Place for Pranks in the Office? Some people think pulling pranks in the office is the height of hilarity. But they should remember that what they view as funny may not be viewed that way by those on the receiving end. There are many opportunities in the workplace for a joke to backfire. Before you think about pulling a prank, think it through. |
||
Absentee Leadership: The Worst Kind of Manager Absentee leaders are managers who are physically present but psychologically absent. They are incompetent and disengaged, to the extent that they don't support their teams adequately. If you have an absentee manager (and don’t have the luxury of seeking another position), here's how you can try to handle the situation. |
||
Continuous Risk Management in Cybersecurity Traditional cybersecurity is reactive. It responds to threats as they surface while trying to minimize the chance they will ever be an issue. Yet in an environment of constant change and evolution, this is insufficient. What your business needs to do is approach cybersecurity from the perspective of continuous risk. |
||
Scrum Roles, Goals, and You The Scrum Guide specifies that there are three roles: product owner, developer, and ScrumMaster. It’s essential that a Scrum team have each of these roles to help it work well. But depending on how you implement the roles, you may end up hurting rather than helping your Scrum process. Focus on goals, not job titles. |