The adoption of Kubernetes-enabled infrastructures and applications has revealed the challenge involved in enabling persistent, reliable data storage in an ephemeral compute…
Read MoreJoin Pluralsight’s Developer Evangelist Jeremy Morgan and Gigaom’s Jon Collins as they discuss the key criteria for evaluating DevSecOps tools. They’ll discuss…
Watch NowSoftware needs to be written, built, and deployed with security in mind. This is true for both the application being created and…
Read More“In a relatively short time, we’ve taken a system built to resist destruction by nuclear weapons and made it vulnerable to toasters.”…
Read MoreAs we learned in the associated report, “Key Criteria for Evaluating DevSecOps Tools,” the field of DevSecOps is part principle and part…
Read MoreGigaOm VP of Research joins us to talk about his report on the key criteria for defining and evaluating DevSecOps tools. GigaOm…
Read MoreWhile DevSecOps is more than just applying application security to CI/CD, it can nonetheless benefit from appropriate automation and tooling. In this report we explore how organizations can adopt DevSecOps principles and practices to reduce risk across development and deployment.…
Read More