There is a firmly held concern in security circles that the automation associated with DevOps moves too swiftly, that security teams and their tests can't keep up, that too many of the metrics measured focus on production, availability, and compliance checkboxes, and as a result, security falls to the wayside.
George V. Hulme |
01 May |
<em>This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter's approach.</em>
By Steve Martino, Vice President, Chief Information Security Officer, Cisco |
23 Apr |
Experts say robots will be commonplace in 10 years. "Many respondents see advances in [artificial intelligence] and robotics pervading nearly every aspect of daily life by the year 2025--from distant manufacturing processes to the most mundane household activities," says Aaron Smith, senior researcher, The Pew Research Center's Internet Project, speaking of the several experts quoted in his "Predictions for the State of AI and Robotics in 2025".
David Geer |
24 Jan |
Perhaps it was an omen of what was to come when the city of San Francisco on New Year's Eve 2010 couldn't get a backup system running in its Emergency Operations Center because no one knew the password.
Ellen Messmer |
02 Dec |
'Tis the season to begin ramping up online shopping activity, and for retailers that means doing all they can to ensure their websites are up, highly available and able to handle peak capacity. Looming in many IT managers' minds is the cautionary tale of Target, whose website crashed twice after it was inundated by an unprecedented number of online shoppers when the retailer began selling clothing and accessories from high-end Italian fashion company Missoni.
Esther Shein |
29 Nov |
More Data Protection features
The case for a managed DDoS protection and mitigation service is well established. Partnering with a provider that can oversee the system’s operation eliminates a big IT issue, augments staff resources, and provides access to specialised DDoS expertise.
Jason Hilling |
13 Dec |
It’s that time of year again when security professionals are preparing for the onslaught of security threats like phishing emails or other social engineering attacks to take advantage of people’s good nature or just the fact that most people are busy trying to get everything ready before they leave on their breaks.
Craig Ford |
13 Dec |
Digital currencies like Bitcoin and Ethereum operate unlike any other financial system.
Sam Bocetta |
12 Dec |
Scammers and cyber criminals are very adept at coming up with new and inventive ways of tricking us into clicking that link and supplying our credentials or credit card information. I have seen emails and websites recently that look just like the real thing.
Ashwin Pal |
12 Dec |
Staying abreast of the latest security tools, running more awareness training workshops for employees…the dawn of a new year is traditionally a time for turning over new leaves and resolving to do things differently and better.
Sumir Karayi |
11 Dec |
More Data Protection opinons