Review code isn’t enough: how the DevSecOps paradigm changes everything
Code review is considered a fundamental aspect of an application’s security approach: source code verification ensures fewer vulnerabilities and more secure software. Yet, it is…
DevOps
What is the FinOps methodology and how does it help to manage resources
The FinOps methodology is becoming increasingly important to establish a new Cloud Operations governance. Companies are investing large sums in cloud infrastructures: traditional technology management…
Application ModernizationCloud AdoptionDevOps
Ercole, the unbeatable asset management software thanks to FinOps
Asset management software is the FinOps ally that should not be underestimated. The FinOps methodology, a portmanteau of the words Financial and Operations, aims to…
DevOps
IT Security and DevOps: Best Practices to Consider
Talking about IT security today means talking about how companies approach the topic and how they intend to mitigate risks. The stakes are too high:…
DevOps
Journey to DevSecOps: make your software more secure
Implementing the DevSecOps methodology may seem like a slow and gradual approach towards a dynamic, that of the integration between development and security, which often…
DevOps
Implementing DevSecOps with Sorint.lab: three phases project
Implementing the DevSecOps methodology ensures safer and more robust applications. Successfully doing so, though, is the result of a gradual journey consisting of small steps…
DevOps
Custom software development: all the trends for 2024
The world of custom software development is constantly evolving, and 2024 promises to be a crucial year for the industry. Companies are increasingly recognizing the…
DevOps
Why is it important to periodically analyse the MongoDB log files?
When a problem occurs in a MongoDB, nstance, the log file can prove to be a key resource in resolving the problem. This may seem…
DevOps
What the Scrum methodology is and how a Scrum team works
Today, let’s find out what the Scrum methodology, uis, an essential tool for those who want to optimise project management and are organised in certain…
DevOps
Vulnerability assessment and penetration testing. The most prevalent enterprise attacks in 2024
In a cybersecurity strategy, identifying weaknesses in one’s IT infrastructure is a critical step in putting adequate protection in place. Typically, this involves two activities…