5 min read - Two new bugs—now fixed—show how single sign-on systems can fall prey to attackers. Here's what went wrong, and what you can learn from it.
7 min read - It's a new world as enterprises consider how to leverage open-source cloud management. Here's a guide to the best tools.
In this GigaOm Research Byte, find out how VSM can identify specific bottlenecks and enable DevOps processes to be improved as a whole.
5 min read - The rapid rise of containers has complicated security pro's jobs. Here are the steps you can take to improve your organization's container security.
5 min read - The move to SaaS has simplified single sign-on. But corporate infrastructure is not any simpler. Here are five SSO recommendations for the enterprise.
6 min read - It's time to plow the dollars you're wasting on unused software into new expenditures. Here's why you should invest in software asset management.
7 min read - Never mind your wallet—what’s in your WAF ruleset?
Security Blogwatch wallet image
Find out what drives, enables, and results from ESM implementations—and get practical recommendations for deployment.
5 min read - Here are some tips for thinking about how you're going to deploy Jenkins, how to diagnose any issues, and steps to scale it as demands grow.
Jenkins Nirvana
Lars Rossen, co-inventor of IT4IT, will take you on a fast-paced tour of the nine value streams that tie together the essential functions of IT. 

Pages