Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevOps

12 Common Tools for Your DevOps Team

DevOps is revolutionizing the way enterprises deliver apps to the market by blending software development and information technology operations. This convergence creates an assembly line for the cloud, as Tim Erlin wrote for The State of Security, by increasing the rate at which companies can develop apps and deliver them to users.

Enhancing Kubernetes Security by Shifting Security Left

In the rapidly evolving world of Kubernetes security & compliance, DevOps and DevSecOps teams are detecting security challenges and compliance issues later in the development & deployment cycles. We are excited to share new features and updates that help DevOps and DevSecOps teams detect issues and ensure compliance throughout the development cycle.

Centralized vs. Distributed Authorization: The CAP Theorem

One of the best parts of working on the Open Policy Agent at Styra is that we get to help people design authorization systems for both their platform and their custom applications. The other day we were talking someone through the design tradeoffs of authorization for their application, and the first decision they had to make was whether they wanted a centralized authorization system or a distributed authorization system. Both OPA and Styra support either, so we have no real bias.

What Is DevOps Maturity, and How Does It Relate to DevOps Security?

By now, many organizations have turned to DevOps as part of their ongoing digital transformations. This process has not been the same for any two companies. Indeed, organizations have embraced DevOps at their own place, and they’ve invested varying levels of time and budget into their nascent deployments.

Why RBAC is not Enough for Kubernetes Security

Kubernetes isn’t (just) fun and games anymore. It’s being rolled out for production; it’s mission-critical; and all the security and compliance rules and regulations of the old world need to somehow be retrofitted onto Kubernetes. Unfortunately, the old tools for access control like RBAC simply aren’t up to the challenge.

Devo recognized in new Intelligent Application & Service Monitoring report

Forrester Research has released The Forrester Wave™: Intelligent Application & Service Monitoring, Q2 2019 report and I am excited to share that Devo has been identified as a Strong Performer. Devo’s recognition as a Strong Performer is, in our opinion, a great validation of our data-first approach.

Scaling up Security with DevOps and CI/CD practices

Some believe that “whatever can be automated, should be automated” and in general benefits include faster production, consistency in product and quality, rolling back from failures and all allowing employees to focus on more creative and analytical tasks. The same can be said for the automation of quality assurance and security of developer coding and programming.

Logging in a DevOps environment: what you should know

DevOps is the new normal, and cloud here is to stay – sound familiar? When you combine the two and distill the technology at the core, what you end up with is the realization of the importance of logs and log management. This is because logs at multiple levels help DevOps teams understand their application and even allow them to detect and address application issues before being promoted into production.