In the past, the application and software development process followed a “waterfall” process. The software was built by the development team before it was then tested and released to the public. Today, with the advent of microservices and organizations looking…
DevSecOps Delivers the Benefits of “Interchangeable Parts” to Government Application Development
This article was authored by Chris Yates, a Senior Solutions Architect at Red Hat, and originally published on the IBM Center for the Business of Government. Read the original article in its entirety by clicking HERE. Eli Whitney, famed inventor…
Increasing Resilience by Embracing Chaos Engineering
This article was authored by Caitlin Stanford, the Global Digital Marketing Manager at Eggplant, and was originally published on the Eggplant blog. Uptime is the performance measure customers and service users judge you on. But in today’s interconnected world, a…
Achieving Strength Through Chaos Engineering
It’s the unexpected and unpredicted that will cause the problems – and in a world where systems are complex and inter-dependent, those are an accident waiting to happen. The difference between 99% and the gold standard of 99.9999% uptime is…
An Integrated Approach to Embedding Security into DevOps – A Best Practices Guide
When software is everywhere, everything becomes an attack surface. The root cause of many successful cyberattacks lies primarily in vulnerable software itself. The real question that needs to be asked is, “Can the industry do a better job of writing more-secure…
Lauren Knausenberger on the Role Personnel Plays in Driving DevSecOps Adoption
To embrace DevSecOps within an organization, there needs to fundamental changes to processes and culture. There also has to be personnel with the knowledge, skills, and abilities necessary to operate in a DevSecOps environment. According to Lauren Knausenberger, Chief Transformation…
How to Select and Implement the Right Secure Coding Standard
With the exponential increase in cybersecurity incidents, software companies are placing greater emphasis on improving application security practices. Historically, security testing happened in the late stages of the development cycle. Thanks to the rise of agile and DevOps, testing efforts…
How to Choose a Modern Static Analysis Tool
Static analysis is the process of examining the source and binary code without execution. It’s usually run for the purposes of finding bugs or evaluating quality. Unlike dynamic analysis, which requires a running program to work, static analysis can be…
Aerospace/Defense Company Deploys Parasoft to Support DevSecOps for Major DoD Initiative
Since 2012, Parasoft has been working with a U.S. Department of Defense contractor in the aerospace and defense industry to improve the quality and security of their software. The contractor is a significant contributor to a major, long-running defense initiative.…
Kubernetes 101: What it is and How it Works
Kubernetes (also known as k8s or “kube”) is an open-source container orchestration platform that automates many of the manual processes involved in deploying, managing, and scaling containerized applications. In other words, you can cluster together groups of hosts running Linux containers, and Kubernetes…