There is an ongoing debate over what term is best: DevSecOps, SecDevOps, or even to drop “sec” altogether since it should be ubiquitous. DevSecOps places security in the middle of the DevOps effort, which is where it rightly belongs. While transparent and a natural part of the process, it should be top of mind and not buried. Security needs […]
How iTmethods Responded to the Log4Shell Vulnerability
Just in time for the holiday season, when bad actors are generally most active, industry experts discovered a critical security flaw that shook the community. A new vulnerability that impacts devices and applications that utilize Java was identified in Log4j, the open-source Apache logging library. Known as Log4Shell, the flaw is considered to be one […]
Why Companies Need GitHub Enterprise and How To Enjoy It as SaaS
With more than 50 million users and 40 million repositories, GitHub has become the world’s largest host of source code—and for good reason. Beyond being simply a source code management and version control tool, it also boasts features that enable code review, project and team management, integrations with other tools, streamlined documentation, and more. But, while those are features that all developers can use and appreciate, […]
Understanding the Gaps in Your DevSecOps
Organizations today are taking great strides when it comes to innovation but unfortunately, security and governance continue to lag behind. Although the DevOps teams ratio is around 10:1, the average DevSecOp ratio is only 100:1. A recent study shows that organizations who prioritize DevSecOps are 3x as likely as their peers to use security as a way to speed up application […]
3 Ways to Manage your DevOps Tools
DevOps tools are what keep the software development process running as effectively as possible, keeping the feedback loop from end-user to developer as short as possible. Tools are also what allow infosec professionals to manage the dizzying array of security configuration and scanning, as well as to automate as much of the security process as possible. The problem is the […]
Solving the Top 5 DevOps Toolchain Challenges
It has been a decade since Mark Andreesen made the case that “Software is eating the world”, and that “every company is a software company” in the Wall Street Journal article. Those arguments have stood the test of time well and are more relevant today than ever thanks to the acceleration of a global workforce driven by COVID. As we’ve seen in the past […]
In a Highly Regulated Industry? You Can Still Get Atlassian as SaaS.
One of the main hesitations organizations have about moving Atlassian Enterprise Deployments to the Cloud is related to compliance. These are completely valid concerns. While Atlassian Cloud offers security suitable for many companies, those requiring a higher standard of data residency, industry compliance, and data security may find their multi-tenant Cloud doesn’t offer as robust […]
Atlassian Server’s Days are Numbered. Here’s What’s Next.
If you haven’t heard yet, Atlassian is discontinuing its server offering. As of February 2, 2021, new customers won’t be able to purchase server, and support for the server offering will end on February 2, 2024. This change reflects Atlassian’s increased focus on the cloud and the general industry trend away from data centers and […]
What’s the Best Option for Hosting Atlassian Tools?
Cloud computing is on the rise among businesses of all types and sizes. According to a report from Intuit, almost 80% of small businesses in the United States will have completely migrated to cloud computing by the end of 2020. But when it comes to hosting Atlassian applications and add-ons, many of which have become mission-critical […]
Managed DevOps Provides Solution to Cybersecurity Fears
The news of open source Jenkins continuous integration/continuous delivery (CI/CD) platforms used to launch distributed denial of service (DDoS) attacks recently made headlines. The CVE-2020-2100 bug would have allowed cybercriminals to employ the Jenkins UDP discovery protocol to bounce traffic between servers until they could no longer respond. Given that many IT departments do not […]