Thu.Feb 13, 2020

article thumbnail

What the Octopus Teaches Us About Agile Organizational Design

Agile Alliance

This entry was written as part of the Supporting Agile Adoption program, an Agile Alliance initiative dedicated to supporting organizations and their people become more Agile. There are some questions in life that simply do not have good answers. “Why do we dream?”, “Are we alone in the universe?” and “Who killed Jimmy Hoffa?

Agile 290
article thumbnail

How to protect your Ring from hackers (and Amazon partners)

The Parallax

The Ring doorbell spent much of 2019 getting buzzed by perceived security and privacy issues, from secret agreements with law enforcement agencies to cybersecurity practices that put its users at risk. Given that Ring, a subsidiary of Amazon.com, bills its devices as helping to build “safer neighborhoods,” its apparently lax approach to protecting customer data struck a number of people as more than ironic.

How To 244
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Product-Service Partnerships

Martin Fowler

When customer companies buy software products, they usually need skilled staff to install them. This staff is usually provided by a service provider company, since software product vendors don't find it makes business sense to build their own services arm. Customers need to be aware of the relationship between product vendors and service providers, and should require transparency on the relationship from those they work with.

Software 176
article thumbnail

The Best Way to Help Your Team Win

Let's Grow Leaders

No one comes to work wanting to do a bad job. Losing is stressful. When the scorecard trends in the wrong direction, how do you help your team win? And how do you help a strong team get even better? The answer […]. The post The Best Way to Help Your Team Win appeared first on Let's Grow Leaders.

Trends 146
article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

Automation Hacks for DevOps Teams

DevOps.com

DevOps teams are expected to do more work in less time. They need to plan, test, build, secure and release applications at a fast-paced rate. Of course, the DevOps team needs to achieve all of this while maintaining high software quality. This is why automation is a crucial part of the DevOps workflow. The goal […]. The post Automation Hacks for DevOps Teams appeared first on DevOps.com.

DevOps 145

More Trending

article thumbnail

The Definition of Faster in the Age of App Capital

DevOps.com

Businesses want speed. One of the impacts of digital transformation—and the associated pressure to succeed in an app economy—is the desire to move at speed. Nearly half (48%) of organizations are driven by digital transformation to deploy faster according to our State of Application Services 2019. But it’s not all about deployment. It’s also about […].

article thumbnail

LYCEUM Takes Center Stage in Middle East Campaign

SecureWorks

LYCEUM Takes Center Stage in Middle East Campaign The previously unobserved LYCEUM threat group targeted critical infrastructure organizations without being detected for more than 12 months. The previously unobserved LYCEUM threat group targeted critical infrastructure organizations without being detected for more than 12 months.

article thumbnail

Wind River Launches CD Platform for Embedded Systems

DevOps.com

Wind River is fostering the adoption of DevOps processes for embedded systems by making available a continuous delivery (CD) platform that its customers can download. Glenn Seiler, vice president for open source strategy for Wind River, said the CD platform is based on an open source instance of the Jenkins continuous integration/continuous delivery (CI/CD) platform. […].

System 115
article thumbnail

Outpacing the Adversary: How Tactics-Based Detection Automatically Finds Attackers

SecureWorks

Outpacing the Adversary: How Tactics-Based Detection Automatically Finds Attackers Let’s open up the big book of cybersecurity clichés.

article thumbnail

Streamlining Database Compliance with CI/CD Integration

IT leaders know the importance of compliance at every level, but the database often gets left behind as other environments are automated for robust protection. This whitepaper emphasizes the importance of robust, auditable, and secure database change management practices for safeguarding organizational compliance. Learn how automating database compliance: Mitigates risk Protects against security vulnerabilities Helps avoid regulatory penalties Aligns database workflows with app lifecycle Turns d

article thumbnail

Into the hybrid cloud future: Red Hat OpenShift is now available for IBM Z and LinuxONE

DevOps.com

By Ross Mauri, General Manager, IBM Z [link] Today we are pleased to announce that Red Hat OpenShift Container Platform is generally available for IBM Z® and IBM LinuxONE™. Red Hat is a leader in hybrid cloud and enterprise Kubernetes, with more than 1,000 customers already using Red Hat OpenShift Container Platform. With the availability […].

Cloud 111
article thumbnail

The Era of SIEMs is Over

SecureWorks

The Era of SIEMs is Over SIEMs have done well to evolve beyond log retention, but their time is up. SIEMs have done well to evolve beyond log retention, but their time is up.

108
108
article thumbnail

Service virtualization: How this misunderstood tech could save you millions

TechBeacon

Despite the proven benefits of service virtualization for software development, the technology often gets underutilized. That's because organizations either haven't heard of it or misunderstand what it is and how to use it.

article thumbnail

Don’t Get Caught on Your Heels: Be Prepared by Being Proactive

SecureWorks

Don’t Get Caught on Your Heels: Be Prepared by Being Proactive Recent events between the United States and Iran have increased our nation’s concern around a cyberattack, acting as a reminder that preparation to defend against threats shouldn’t be postponed. Recent events between the United States and Iran have increased our nation’s concern around a cyberattack, acting as a reminder that preparation to defend against threats shouldn’t be postponed.

108
108
article thumbnail

Peak Performance: Continuous Testing & Evaluation of LLM-Based Applications

Speaker: Aarushi Kansal, AI Leader & Author and Tony Karrer, Founder & CTO at Aggregage

Software leaders who are building applications based on Large Language Models (LLMs) often find it a challenge to achieve reliability. It’s no surprise given the non-deterministic nature of LLMs. To effectively create reliable LLM-based (often with RAG) applications, extensive testing and evaluation processes are crucial. This often ends up involving meticulous adjustments to prompts.

article thumbnail

AI for Good with DataRobot: Saving the World One Use Case at a Time

DataRobot

We are excited to announce the first round of program participants in AI for Good: Powered by DataRobot. Welcome Kiva International, DonorsChoose, University of California San Francisco’s Brain and Spinal Injury Center, Anacostia Riverkeeper, and Medical Faculty Mannheim - Heidelberg University to the DataRobot family! We look forward to providing updates on their AI-driven humanitarian use cases throughout the year.

article thumbnail

Own The Router, Own The Traffic

SecureWorks

Own The Router, Own The Traffic As threat actors increasingly target supply chains, man-on-the-side techniques introduce another layer of complexity that organizations must consider. As threat actors increasingly target supply chains, man-on-the-side techniques introduce another layer of complexity that organizations must consider.

article thumbnail

Top 10 FOSS legal developments in 2019

Synopsys

2019 saw developments in many free and open source software legal issues, including new models, ethical restrictions, blockchain, and data and cryptography. The post Top 10 FOSS legal developments in 2019 appeared first on Software Integrity Blog.

article thumbnail

REvil: The GandCrab Connection

SecureWorks

REvil: The GandCrab Connection Technical links between the REvil and GandCrab ransomware families prove that the GandCrab malware authors did not retire in June 2019 as they claimed. Technical links between the REvil and GandCrab ransomware families prove that the GandCrab malware authors did not retire in June 2019 as they claimed.

Malware 109
article thumbnail

Top 5 Challenges in Designing a Data Warehouse for Multi-Tenant Analytics

Multi-tenant architecture allows software vendors to realize tremendous efficiencies by maintaining a single application stack instead of separate database instances while meeting data privacy needs. When you use a data warehouse to power your multi-tenant analytics, the proper approach is vital. Multi-tenant analytics is NOT the primary use case with traditional data warehouses, causing data security challenges.

article thumbnail

Integrating IBM Z and LinuxONE into the Red Hat OpenShift developer ecosystem

DevOps.com

By Willie Tejada, GM & Chief Developer Advocate, IBM Cognitive Applications [link] My role at IBM is to make sure that we’re equipping developers with the tools and resources you need, along with the selection and guard rails you prefer, to help you focus your efforts entirely on innovation. Security is key to unlocking the […]. The post Integrating IBM Z and LinuxONE into the Red Hat OpenShift developer ecosystem appeared first on DevOps.com.

article thumbnail

Join us at RSA Conference 2020

SecureWorks

Join us at RSA Conference 2020 Come to booth 4437 for the free screen-printed t-shirts. Stay for our theater presentations, on-site security experts, and product demos. Come to booth 4437 for the free screen-printed t-shirts. Stay for our theater presentations, on-site security experts, and product demos.

article thumbnail

CEO Spotlight: How to Source Great Talent in a Tight Labor Market – Joanna Riley

CEO Insider

The United States is experiencing a tighter labor market than it has in the past two decades. The national unemployment rate is at a 50-year low, and fewer people are searching for employment. “Tight labor markets are sectors on the verge of full employment, and more positions are open than people can fill,” says Joanna […].

article thumbnail

TrickBot Modifications Target U.S. Mobile Users

SecureWorks

TrickBot Modifications Target U.S. Mobile Users The long-running botnet added functionality to solicit PIN codes from mobile customers, which could allow threat actors to access victims’ voice and text communications. The long-running botnet TickBot added functionality to solicit PIN codes from mobile customers, which could allow threat actors to access victims’ voice and text communications.

Mobile 106
article thumbnail

7 Pitfalls for Apache Cassandra in Production

Apache Cassandra is an open-source distributed database that boasts an architecture that delivers high scalability, near 100% availability, and powerful read-and-write performance required for many data-heavy use cases. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance.

article thumbnail

Synopsys Advances DevSecOps via IDE Plugin

DevOps.com

Synopsys has extended the static application security testing (SAST) and software composition analysis (SCA) of the Code Sight plugin it makes available for integrated development environments (IDEs). The latest iteration of Code Sight adds the ability to analyze declared and transitive open source dependencies to identify components with known security issues alongside SAST findings without […].

article thumbnail

COBALT DICKENS Goes Back to School…Again

SecureWorks

COBALT DICKENS Goes Back to School…Again The COBALT DICKENS threat group persists despite law enforcement actions and public disclosures, conducting another global campaign targeting universities. The COBALT DICKENS threat group persists despite law enforcement actions and public disclosures, conducting another global campaign targeting universities.

Groups 105
article thumbnail

New Features in Veritas Backup Exec 20.6 to Protect Your Nonprofit's Data

TechSoup

Veritas Backup Exec (Veritas BE) is a fantastic tool designed to protect your valuable data against mistakes, viruses, and disasters. Setup and configuration are very user-friendly, and the intuitive interface makes it easy to understand where your data is being stored. In the event of a problem, Veritas' disaster recovery systems can have all of your data restored to the same or dissimilar hardware in minutes, with almost no downtime.

Backup 90
article thumbnail

Can HIPAA Help Secure the Health Care Space?

SecureWorks

Can HIPAA Help Secure the Health Care Space? Health care has long topped the list of industry rankings with the highest amount of data breaches. While other industries are also experiencing an increase in data breaches, the health care industry remains a prime target for attackers. Health care has long topped the list of industry rankings with the highest amount of data breaches.

article thumbnail

Reimagined: Building Products with Generative AI

“Reimagined: Building Products with Generative AI” is an extensive guide for integrating generative AI into product strategy and careers featuring over 150 real-world examples, 30 case studies, and 20+ frameworks, and endorsed by over 20 leading AI and product executives, inventors, entrepreneurs, and researchers.

article thumbnail

SaltStack Updates Enterprise IT Automation Framework

DevOps.com

SaltStack has partnered with Tenable.io to make it possible to pull vulnerability data into the enterprise edition of its namesake IT automation framework. In addition, version 6.2 of SaltStack Enterprise now integrates with the IT operations analytics platform from Splunk to make it possible to configure the Splunk Universal Forwarder to index and analyze events […].

article thumbnail

What is the Recipe for Threat Detection?

SecureWorks

What is the Recipe for Threat Detection? Misconceptions about tools and tactics mess with the ingredient mix needed to mitigate risk. Misconceptions about tools and tactics mess with the ingredient mix needed to mitigate risk.

Tools 95
article thumbnail

Gaining Speed – The Momentum around Data Protection for Kubernetes

Dell EMC

Physicists define momentum as “the impetus gained by a moving object.” That may be the technical view, but in the world outside of physics, momentum commonly means “gaining speed.” Many things thrive on momentum. An underdog sports team can gain momentum and work their way to a championship. Politicians can ride a wave of momentum into office.

Sport 86