spot_imgspot_imgspot_imgspot_img

Agile

Are you ready for DevSecOps? Five key indicators to think about it twice

Everyone talks about DevSecOps nowadays. A lot of companies implement the main concepts of it. Some of them are pretty successful while others face major (organizational) challenges. It's great to hear the success stories of the companies that are well on their way. However, it's also extremely valuable to...

Container Platforms and governance – the complete picture (part 2)

Container Platforms are hot - many organizations nowadays explore the options to acquire a "ready-made" solution or build one themselves. In the previous article, we explored a long list of the organizational challenges as well as some business-related aspects that are important. As a follow up we now present some...

Container Platforms and governance – the complete picture (part 1)

Nearly every (large scale) organization has adopted containers now in a certain shape or form. Containers and Kubernetes are still on the rise. The number of Kubernetes clusters grows rapidly and many of those organizations explore ways to acquire or build a so-called "container platform". They already see clear...

These OWASP Git repos help to strengthen your security skills

OWASP stands for the Open Web Application Security Program. It is a worldwide organization that follows security trends and provides standards and guidelines to embed security into software applications in every stage of their lifecycle. Many developers trust the OWASP Top 10 as one of the most comprehensive and...

The various functions of a service mesh in cloud native systems

Today, with the rise of microservices, most organizations struggle to keep up with the increased complexity of their mission-critical workloads. While orchestration tools like Kubernetes help with the creation, management, and decommissioning of containers, they don’t aid teams in managing traffic between various services. When teams build new services,...

The how, what and why of certificate management

All tech oriented organizations need to secure their assets. Whether it be an application that processes sensitive information, a website that acts as brochure-ware or a large database. Besides these, they also need to secure other forms of data storage and communication such as emails, credit card transactions and...

CI/CD pitfalls and the best practices to keep in mind

Are you killing the goose that lays golden eggs? Yes, maybe. The metaphoric goose we’re talking about here is your CI/CD pipeline. CI/CD has slowly become the primary way of delivering software today. And as the software development world has moved away from monoliths to microservices and containers, the...

Key topics to decide about centralized versus federated control

Big enterprises that employ a large number of Agile teams to produce software applications face numerous challenges to keep their business healthy. Not only the technical aspects of different applications play a role here, but also a lot of organizational aspects. Think of attracting new talent, roll out training...

Top 4 Cloud Agnostic CI/CD solutions that are vendor neutral

The IT landscape tends to change drastically. Organizations are beginning to realize the benefits of a multi-cloud or hybrid cloud infrastructure. A multi-cloud or hybrid cloud platform helps organizations pick and choose services that best suit their workloads. Having an option to choose from various vendors helps ensure that...

Important notes about application logging in the cloud

Many organizations run their applications in the cloud. They already saw the benefits of increased agility and flexibility. To prevent problems it's important to closely watch those applications to make sure they keep running smooth. Your DevOps teams need to react to incidents and problems, there is no operations...