Related Content
The Security Risks of the Internet of Things The Internet of Things is making life easier, but is it making it more secure? If you take into account that hackers can remotely control Chrysler automobiles that are connected to a network, the answer seems to be no. If this is where our world is headed, how should we think about security now? |
||
Ignore the Data at Your Own Risk At work, the evidence of something worth paying attention to is often front and center, and yet we dismiss it. If you ignore the data—negative survey results, team member absences, an increase in bugs, stakeholders who repeatedly miss meetings, etc.—you could be overlooking signs of trouble. |
||
The Potential for DevOps in Fighting Cyber Warfare Government hacking incidents have put cyber warfare in the news. DevOps actually presents an interesting arsenal. With DevOps, your systems have excellent environment monitoring and are cryptographically verifiable such that the slightest penetration or unauthorized change is immediately detected. |
||
DevOps Can Be Secure and Agile at the Same Time When it comes to DevOps, the goal is to move applications from development, to test, and then eventually to deployment as quickly and efficiently as possible. However, you can still be agile while having a safe, properly security-tested DevOps environment. |
||
Can Bug Bounty Programs Replace In-House Testing? Large companies have long used bug bounty programs to find vulnerabilities in their software, but these initiatives are becoming increasingly common among individual developers, too. Should a small business use a bug bounty program? And could it even replace their in-house testing? Should it? |
||
Managing Security Testing in Agile Software Development One of the biggest myths in the world of agile development is that there is not enough time to do security testing. Sanjay Zalavadia shows you the most efficient and cost-effective way of performing security testing in an agile environment: by rolling it into each sprint incrementally, from day one. |
||
Are You a Victim of Ubiquitous Computing? Ubiquitous computing—anywhere, anytime computing—is on the rise. And while the benefits of anywhere, anytime computing are numerous, there are new and invisible risks that cannot be ignored. Rajini Padmanaban looks at ubiquitous computing and its effect on society. |
||
Social, Mobile, Analytics, and the Cloud Together Are the Future of IT The next wave in IT seems to be SMAC technologies—or social, mobile, analytics, and the cloud. Individually, each of the pieces of the “SMAC stack” are not new to us. However, what is changing now is the use of these four elements together as an integrated ecosystem, rather than as separate silos. |