|
Security Partners or Security Police?
Slideshow
It’s often said that with great power comes great responsibility. As technology becomes more powerful, security becomes a great responsibility.
|
Janna Loeffler
|
|
Visual Regression Testing: A Critical Part of a Mobile Testing Strategy
Slideshow
There are many types of testing that companies need to perform in order to have confidence in their product: security testing, integration testing, system testing, performance testing, and more.
|
Dmitry Vinnik
|
|
4 Keys to Protecting Your Data in a DevOps World It may seem like the desires for end-to-end DevOps and protection of sensitive data are in conflict, but if done correctly, they can be two sides of the same coin. DevOps processes such as version control and delivery automation introduce the very measures needed to properly protect production data. The key to keeping data safe while using it during your DevOps process is to focus on these four areas.
|
|
|
Understanding the Role of QA in DevOps: An Interview with Gene Gotimer
Video
Gene Gotimer, senior architect at Coveros Inc., discusses understanding the role of QA in DevOps, DevOps educational tools, trusting your team, and paid and open source security tools.
|
|
|
Serverless Security: Overcome Architectural Security Challenges
Slideshow
Serverless architectures take the idea of microservices to the extreme. To implement secure serverless architectures, you have to understand how to compartmentalize programs at the function level. You also need to factor in security practices: Serverless architectures are susceptible to traditional attacks such as SQL injection and command injection, along with a wide variety of privilege escalation and sensitive data disclosure attacks. Developers must consider what would happen if an attacker attempted to invoke each of their functions directly. What if one of those functions were to become nonresponsive? Designing, implementing, and maintaining serverless architectures dramatically increases the complexity of security. Join Eric Sheridan as he discusses how to implement distributed, secure identity management and entitlement enforcement across 250+ functions.
|
Eric Sheridan
|
|
DevSecOps in the Age of Containers
Slideshow
As IT shops look to move their workloads into containers and the cloud, their initial concerns often center around the security implications. Containers do force us to change how we think about securing our application, but they also offer exciting new opportunities. Curtis Yanko will explore the security concerns that come along with containers and take a deep dive into container composability and how modern tooling makes it possible to automate security and compliance concerns across the entire application stack. Curtis will share a project via GitHub that has a reference Jenkins pipeline demonstrating how to automate security and compliance at build time. You will take home ideas for minimizing attack surface, avoiding known bad libraries and frameworks, validating your configuration, and using machine learning to model application behavior.
|
Curtis Yanko
|
|
Combatting Threats to Payment Processing in the Era of Connected Ecosystems
Slideshow
In an increasingly connected world, protection from security vulnerabilities and threats is essential. Yet providing that protection can be complex to understand, especially with changes in digital technology, consumer demands, and how social media influences consumer shopping and payment...
|
Elizabeth Koumpan
|
|
Giving Control Back to Software Developers: An Interview with Mike Faulise
Video
In this interview, Michael Faulise, the founder and managing partner at tap|QA, explains how the move toward DevOps and away from release management is giving control back to developers, then details why major companies often need partners to leverage CI, CD, and other modern techniques.
|
|
|
Why You Need to Take Security and DevOps Seriously: An Interview with Jeff Payne
Video
In this interview, Jeff Payne, the CEO and cofounder of Coveros, explains why major companies just aren’t that good at security. He discusses how you can better protect your business, as well as why DevOps can and should be a key to your success.
|
|
|
A Definition of Done for DevSecOps
Slideshow
[video:https://youtu.be/oQE8ysEvzaQ width:300 height:200 align:right]
|
Gene Gotimer
|