DevOps

DevOps

Review code isn’t enough: how the DevSecOps paradigm changes everything

Code review is considered a fundamental aspect of an application’s security approach: source code verification ensures fewer vulnerabilities and more secure software. Yet, it is…
finops
DevOps

What is the FinOps methodology and how does it help to manage resources

The FinOps methodology is becoming increasingly important to establish a new Cloud Operations governance. Companies are investing large sums in cloud infrastructures: traditional technology management…
Software asset management
Application Modernization, Cloud Adoption, DevOps

Ercole, the unbeatable asset management software thanks to FinOps

Asset management software is the FinOps ally that should not be underestimated. The FinOps methodology, a portmanteau of the words Financial and Operations, aims to…
sicurezza IT
DevOps

IT Security and DevOps: Best Practices to Consider

Talking about IT security today means talking about how companies approach the topic and how they intend to mitigate risks. The stakes are too high:…
devsecops
DevOps

Journey to DevSecOps: make your software more secure

Implementing the DevSecOps methodology may seem like a slow and gradual approach towards a dynamic, that of the integration between development and security, which often…
devsecops
DevOps

Implementing DevSecOps with Sorint.lab: three phases project

Implementing the DevSecOps methodology ensures safer and more robust applications. Successfully doing so, though, is the result of a gradual journey consisting of small steps…
sviluppo software su misura
DevOps

Custom software development: all the trends for 2024

The world of custom software development is constantly evolving, and 2024 promises to be a crucial year for the industry. Companies are increasingly recognizing the…
DevOps

Why is it important to periodically analyse the MongoDB log files?

When a problem occurs in a MongoDB, nstance, the log file can prove to be a key resource in resolving the problem. This may seem…
DevOps

What the Scrum methodology is and how a Scrum team works

Today, let’s find out what the Scrum methodology, uis, an essential tool for those who want to optimise project management and are organised in certain…
DevOps

Vulnerability assessment and penetration testing. The most prevalent enterprise attacks in 2024

In a cybersecurity strategy, identifying weaknesses in one’s IT infrastructure is a critical step in putting adequate protection in place. Typically, this involves two activities…