Getting Started with Azure DevOps: Services and Tips

Microsoft Azure is a top cloud vendor offering a wide range of services. Azure DevOps is a relatively new service (launched in 2018) that offers a collection of cloud-based Azure-native services that answer certain DevOps needs. 

This article reviews five Azure DevOps services, each providing certain capabilities — Azure Boards, Azure Pipelines, Azure Repos, Azure Test Plans, and Azure Artifacts. You will also learn four tips for optimizing Azure DevOps processes. 

A Brief History of EDR Security

Endpoint Detection and Response (EDR) solutions were developed to fill security gaps left by other tools. The need for EDR can be traced to the early 2010s, but the term EDR was officially coined in 2013. In this article, you’ll learn about the threats that lead to the development of EDR tools, past reincarnations of EDR solutions, and how EDR security will look like in the future.

2010: Threats Leading to The Development of EDR

In the early 2010s, attackers began developing methods for running malicious code without having to install malware. These attacks enabled them to bypass traditional security measures, which relied on identifying malicious executables. Below are some of the methods attackers developed and continue to refine.

Web Development Trends and Techniques for 2020

Web development trends are always changing. After they show up, some evolve for the better and last for years. Others disappear quite quickly, not leaving much of a mark. Many of the trends that started in 2019 are making their way to 2020. This article digs the web development trends a little deeper and predicts which trends will expand in 2020.

The following are some trends to keep an eye out for:

What Developers Need to Know About Java Security

Java gained a reputation as a secure programming language when it was introduced in the mid-1990s. At that time, C or C++ was used for the majority of business programming. Java removed many pitfalls and vulnerabilities of those languages, like manual memory allocation.

This reputation as a more secure language does not mean that all Java code is automatically secure. Developers still have to make sure that they deliver secure code. Fortunately, you can stay on top of your Java security by keeping an eye on possible Java threats.

Top 5 Security Practices for AWS Backup

Make a backup of your backup's backup.

Cloud storage has become increasingly popular in recent years. Many companies choose to migrate their workload to the cloud, attracted by the low costs and high-availability. Although the cloud presents many benefits, most companies are concerned about the security of the data stored within. An effective backup service can help organizations protect their data while benefiting from cloud services.

Kubernetes vs OpenShift: What Is the Difference?

Containerization is the new buzz word for developing and deploying apps since they are an efficient way to accelerate development. Container usage has grown exponentially in the last years.

However, managing containers across the infrastructure can become such a complex task that a container management platform is an essential vehicle for any organization. Kubernetes and OpenShift are two of the most popular container management platforms in the market. What makes it interesting is that OpenShift is based on Kubernetes. Read on to learn more about their features and differences.