Skip to main content
Home
Our ContributorsAbout
 
  • App Dev & Testing

    Get up to speed fast on the techniques behind successful enterprise application development, QA testing and software delivery from leading practitioners.

    View all   
    Car engine bay
    Performance tuning?

    Data engines: What's under your hood?

    Long exposure nightime photograph of burning steel wool swung in an infinity pattern
    Close the infinite loop

    How to move beyond shift left, to shift 360

    Ariel photograph of high rise building pushing through clouds
    Lofty intent

    Building secure and compliant cloud-first infrastructure

    View of London with  old, derelict buildings in foreground and tall, modern, shiny skyscraper behind.
    Old to new

    Securing your application modernization process

    Snearing white and brown short coated small dog
    Work together

    How to embrace secure software development practices

  • Enterprise IT

    Trends and best practices for provisioning, deploying, monitoring and managing enterprise IT systems. Understand challenges and best practices for ITOM, hybrid IT, ITSM and more.

    View all   
    Red and white sign displayed at Snowmass, near Aspen, Colorado, warning of potentailly deadly concequences of going further.
    Decision point

    6 data-driven diagnoses for the digital dilemma

    Trendy grandmother with skateboard
    Admiral Hopper probably wouldn’t be shocked

    It’s not your grandmother’s COBOL

    Hand reaching for the clouds
    Reach for the cloud

    5 tips for tackling cloud migration

    White sail boat, tacking into the headwind, on a body of water.
    Keep out of the doldrums

    Tacking into business headwinds with digital transformation

    Male dancer in arieal spin, demonstrating flexibility
    In praise of flexibility

    What extensibility means to business efficiency and innovation

  • Security

    All things security for software engineering, DevOps, and IT Ops teams. Stay out front on application security, information security and data security.

    View all   
    Heart rate sensor circuit
    When things attack

    Lives, property, economies, and the IoT risk

    Security guard in yellow and black jacket on street
    Relative risk

    CISOs: Think strategically to beat the bad guys

    A rolled and banded copy of The New York Times with President Joe Biden on the front page
    Strategies for success

    How to meet US federal guidelines for application security

    Grey storm clouds
    Stormy, with a chance of breach

    Privacy, AI, and automation in the multi-cloud era

    Shop's come in we're open sign on a blue door
    Come in, we're open

    How to close OSS attack vectors in your supply chain

  • GUIDES

    TechBeacon Guides are collections of stories on topics relevant to technology practitioners.

    View all   
    The future is security as code. Find...

    TechBeacon Guide: DevSecOps and Security as Code

    It can be challenging to operate and...

    TechBeacon Guide: SecOps Tooling

    Software quality is a top priority,...

    TechBeacon Guide: World Quality Report 2021-22

    Based on responses from over 500...

    TechBeacon Guide: The State of SecOps 2021

    Modern app design and DevSecOps...

    TechBeacon Guide: Application Security Testing

  • CONFERENCES

    Discover and register for the best 2021 tech conferences and webinars for app dev & testing, DevOps, enterprise IT and security.

    View all   
    Managing your IT assets in hybrid,...

    Webinar: Maximizing Your IT Assets

    Do you want the freedom that...

    Webinar: Get a Fast Pass to Full-Stack AIOps

    As organizations migrate to the cloud...

    Webinar: Access Mainframes Securely from the Cloud

    In the wake of the pandemic,...

    Webinar: Best Practices to Protect Data in the Cloud

    Fireside chatAs indicated in the most...

    Webinar: Threat Hunting—Stories from the Trenches

Subscribe
Home
  • Our Contributors
  • About
Subscribe
  • App Dev & Testing
  • Enterprise IT
  • Security
  • Guides
  • Conferences
  • Our Contributors
  • About
Subscribe
Guides
Conferences
Featured
Heart rate sensor circuit
When things attack

Lives, property, economies, and the IoT risk

by Kate Scarcella
Featured
Heart rate sensor circuit
The ease at which attackers can compromise an IoT device is shocking. Organizations operating in the IoT space must rethink their security posture.
When things attack

Lives, property, economies, and the IoT risk

by Kate Scarcella
Relative risk

CISOs: Think strategically to beat the bad guys

by Allen Bernard
Relative risk

CISOs: Think strategically to beat the bad guys

by Allen Bernard
Performance tuning?

Data engines: What's under your hood?

by Adi Gelvan
Performance tuning?

Data engines: What's under your hood?

by Adi Gelvan
Trending Stories
Keep it simple, stupid
Keep it simple, stupid

5 principles for 'stupidly brilliant' JavaScript apps

by Mike Manwill
Don't lose sleep
Don't lose sleep

How to avoid data governance nightmares

by Sairam Bollapragada, Satish Matukumalli
Reach for the cloud
Reach for the cloud

5 tips for tackling cloud migration

by Derek Swanson
Reach for the sky
Reach for the sky

Mainframe applications are going hybrid

by Allen Bernard
 
  • App Dev & Testing
    App Dev & Testing

    Get up to speed on the techniques behind successful application development, QA testing and delivery.

    Performance tuning?

    Data engines: What's under your hood?

    by Adi Gelvan
    Performance tuning?

    Data engines: What's under your hood?

    by Adi Gelvan
    Close the infinite loop

    How to move beyond shift left, to shift 360

    by Kirsten Newcomer
    Close the infinite loop

    How to move beyond shift left, to shift 360

    by Kirsten Newcomer
    Lofty intent

    Building secure and compliant cloud-first infrastructure

    by Prashanth Nanjundappa
    Lofty intent

    Building secure and compliant cloud-first infrastructure

    by Prashanth Nanjundappa
    More App Dev & Testing  
  • Enterprise IT
    Enterprise IT

    How to provision, deploy, monitor, and manage IT systems. Understand the challenges and best practices.

    Decision point

    6 data-driven diagnoses for the digital dilemma

    by Derek Britton
    Decision point

    6 data-driven diagnoses for the digital dilemma

    by Derek Britton
    Admiral Hopper probably wouldn’t be shocked

    It’s not your grandmother’s COBOL

    by Johanna Ambrosio
    Admiral Hopper probably wouldn’t be shocked

    It’s not your grandmother’s COBOL

    by Johanna Ambrosio
    Reach for the cloud

    5 tips for tackling cloud migration

    by Derek Swanson
    Reach for the cloud

    5 tips for tackling cloud migration

    by Derek Swanson
    More Enterprise IT  
  • Security
    Security

    All things security for software, DevOps, and IT Ops teams. Stay out front on app sec, infosec and data sec.

    When things attack

    Lives, property, economies, and the IoT risk

    by Kate Scarcella
    When things attack

    Lives, property, economies, and the IoT risk

    by Kate Scarcella
    Relative risk

    CISOs: Think strategically to beat the bad guys

    by Allen Bernard
    Relative risk

    CISOs: Think strategically to beat the bad guys

    by Allen Bernard
    Strategies for success

    How to meet US federal guidelines for application security

    by Manish Gupta
    Strategies for success

    How to meet US federal guidelines for application security

    by Manish Gupta
    More Security  
  • GUIDES
    GUIDES

    TechBeacon Guides are collections of stories on topics relevant to technology practitioners.

    TechBeacon Guide: DevSecOps and Security as Code

    The future is security as code. Find out how DevSecOps gets you there with our guide. Plus:...

    TechBeacon Guide: DevSecOps and Security as Code

    The future is security as code. Find out how DevSecOps gets you there with our guide. Plus:...

    TechBeacon Guide: SecOps Tooling

    It can be challenging to operate and maintain security information and event management (SIEM)...

    TechBeacon Guide: SecOps Tooling

    It can be challenging to operate and maintain security information and event management (SIEM)...

    TechBeacon Guide: World Quality Report 2021-22

    Software quality is a top priority, and testing is more important than ever as digital...

    TechBeacon Guide: World Quality Report 2021-22

    Software quality is a top priority, and testing is more important than ever as digital...

    More GUIDES  

Home

Brought to you by
HP

Topics

  • App Dev & Testing
  • Enterprise IT
  • Security
  • GUIDES
  • CONFERENCES

TechBeacon

  • About
  • Our Contributors
  • Terms of Use
  • Privacy
Cookie Privacy Manager

Subscribe to TechBeacon

Get the latest delivered straight to your inbox.

What topics interest you?

I'd like to receive emails from TechBeacon and Micro Focus to stay up-to-date on products, services, education, research, news, events, and promotions.

Sign up

Thanks for subscribing!

Check your email for the latest from TechBeacon.

© Copyright 2015 – 2022 Micro Focus or one of its affiliates
Back to top