Related Content
5 Myths about API Security APIs are designed to provide interfaces between multiple applications, allowing them to work together. From a security perspective, this is a powerful tool to have. Unfortunately, the effectiveness of APIs diminishes if they are misunderstood. Here are five common myths about API security, along with the facts. |
||
Mob Programming: Working Well Together Mob programming is a whole-team approach to creating software where everyone works together on the same thing at the same computer. It's not a bunch of people watching one person write code, but rather everyone thinking, discussing, designing, and collaborating. Sound crazy? Here's how it improves the quality of code. |
||
Testing Your DevOps Is Just as Important as Testing Your Software Many DevOps engineers fail to test their automation code in the same way they test the software they deploy. It's crucial for software to have tests, and this should apply to infrastructure-as-code software too, if we plan to change and improve this code with no worries about breaking automation in our DevOps pipeline. |
||
A Definition of Done for DevSecOps In DevOps, we have a software delivery pipeline that checks, deploys, and tests every build. The goal is to produce a viable candidate for production, so we have to look at many different aspects of quality, including security. To be sure we hit all the crucial marks, we should have a definition of done for DevSecOps. |
||
6 Ways to Protect Your Organization from DDoS Attacks During a DDoS attack, no one can use your application, which will result in loss of business. Brand reputation also tumbles if customers can't access your site or become casualties of the data breaches. However, there are some proven practices for preventing DDoS attacks—and for what to do if you fall victim to one. |
||
What the Future Holds for Cloud Computing Thanks to the development of cloud architecture away from a server-client pattern, those in the software industry will be able to embrace heterogenous cloud services that can only run when needed. Consequently, we are due for a cloud renaissance. Here are some predictions for what the future holds for cloud computing. |
||
Why the Burden of Security Should Be Assumed by the Entire Team Quality can be improved over time, and while it’s difficult to change perception, it’s still possible. But poor security can sink your ship before it even leaves the dock. Invest in the security of your application and be sure to spread that responsibility to multiple levels of your software team. |
||
Security Testers Should Think like Hackers It is a common belief that testers should think like end-users by going beyond the defined requirements, seeing if the application under test addresses end-user expectations, and evaluating how it fares against competition. But with security testing, testers have to think not only like end-users, but also like hackers. |