When it comes to making certain safe cloud app rollouts, there’s flat-out animosity between business shareholders. HackerOne’s Alex Rice and GitLab’s Johnathan Hunt share tips on quashing all the squabbling.
Programs are cybercriminals’ favorite ways to crack open up focused businesses.
But no one workforce or method can guarantee the rollout of risk-free cloud applications. From code structure to device tests to deployment, groups and resources have to work with each other to detect threats early when holding the pipeline of electronic merchandise transferring.
Alex Rice, CTO at HackerOne and Johnathan Hunt, VP of Security at GitLab, assistance advancement groups evolve their procedures to create security specifically into their workflows for easy and safe cloud application rollouts.
They dropped by the Threatpost podcast just lately to share strategies on DevSecOps, which include:
- How to build a continuous testing, checking, and comments procedures to push down software risk.
- Acquiring a continual method to application security and DevOps security resources.
- Why collaboration and continuous feedback is crucial throughout enhancement, cloud and security teams.
…as perfectly as how to offer with the boatload of animosity in between enhancement and security groups. One particular idea: Presume optimistic intent!
Heads-up: Along with Aron Eidleman, Companion Options Architect at AWS, Alex and Johnathan will be collaborating in a joint webinar on Feb. 23 to discuss the relevance of layering security tactics into your DevOps workflows.
You can down load the podcast beneath or listen below. For much more podcasts, test out Threatpost’s podcast website.
Join Threatpost on Wed. Feb 23 at 2 PM ET for a Are living roundtable discussion “The Key to Holding Secrets,” sponsored by Keeper Security, targeted on how to identify and lock down your organization’s most sensitive details. Zane Bond with Keeper Security will be a part of Threatpost’s Becky Bracken to offer concrete ways to protect your organization’s critical information in the cloud, in transit and in storage. Sign-up NOW and you should Tweet us your thoughts forward of time @Threatpost so they can be included in the dialogue.
Some components of this post are sourced from:
threatpost.com