Apache Kafka's popularity is exploding. Learn about what it is, and why it's becoming a solution of big data and microservices applications and...
Whether or not to ditch mobile management will remain a question organizations must answer for themselves. Here's how to decide if the move is...
Static, dynamic, or interactive application security testing: The debate goes on but four best practices for putting app sec tools to work for your...
Blameless postmortems feel wrong since humans are wired for blame. Successful teams are blame-aware and focus on actionable outcomes without going...
So you want to move to microservices? Time to build your testing strategy with these 3 types of tests that are critical in a system for distributed...
The world of software containers is here. We need to prepare with new approaches to architecture, security, and performance testing suited...
Penetration testing is a key step in avoiding mobile app hacks. Here are best practices to ensure apps have been properly tested against security...
DROWN is a serious vulnerability that affects HTTPS and any other services that use SSL and TLS. Here's what you need to know about it.
Here's what you need to know about the new IT4IT Reference Architecture, and why the Information Technology Infrastructure Library (ITIL) is no...
Mobile technologies add a layer of complexity that require new single sign-on (SSO) technologies and approaches. Here's how SSO can be implemented...

Pages