CA Technologies says, “For DevOps to work correctly, it must be treated as
a movement, not a market for a specific vendor’s products.”
As Arlo Guthrie once sang, with three people it is an organization. But if we
can find 50 people who can sing the praises of DevOps, it can become a
movement! Trouble is, many software developers are stuck in the past. In a
2012 service virtualization survey of IT executives and managers by analyst
firm voke, only 6% of the group responded they were completely confident that
new IT applications would be delivered to market on time.
But maybe its high time DevOps becomes a movement. You can read more about
this idea in my post last week on CA’s blog here.
As we get into the holidays, I want to ask all of your startup CEOs this
question. Could you be paying yourself too much, and risk losing your
business eventually? No, this isn’t coming from my Scrooge side, but some
Last week, a Sili Valley startup (Yet Another Social Media Posting Tool)
posted, in the name of complete transparency, their entire staff salary
schedule, from the lowliest workers on up to the CEO, who is getting nearly
$160k. While people weighed in on whether or not this is Yet Another GenY
Oversharing, what got me going on this particular scr... (more)
Single sign-on isn’t new: it has been around for more than a decade to help
enterprises manage multiple passwords. And given the number of leaked
passwords as of late it is becoming increasingly important as a security
tool. What is new however is that an SSO tool can secure both local server
and cloud-based ones.
You can read more of my thoughts for a custom white paper I wrote for McAfee
here.And here is a link if you would like to read my review of 8 different
SSO tools that I did for Network World earlier this year, including
McAfee’s and Okta’s products.
I have been to a couple of white hat security seminars over the past two
weeks, one put on by Fishnet at the local SecureWorld Expo and another by
Network Technology Partners. By white hat I mean people who are paid to break
into their clients’ networks and demonstrate various security weaknesses.
The biggest skill required? Wear a suit and smile. Sure, it is nice to have
various gizmos and technical tools, but getting in the door is easy if you
Social engineering, as this is called, isn’t new. Kevin Mitnick mastered
this in the 1980s, although back then he was most... (more)
Like many of you, I heard last month about the Adobe breach and didn’t give
it much mindshare. Turns out things keep getting worse, and I was foolish to
ignore what happened. Mea culpa. Here is a catch-up column along with lotsa
links that go into further details, and why you should be worried.
When I first heard about it, I thought: I don’t have anything to worry
about. I am not a user of their products. And then I thought, so big deal: a
few emails and passwords released to the bad guys. Wrong, wrong and wrong.
First of all, it now turns out there are 130 million email-password ... (more)