SDLC Comparision: Agile vs DevOps

Agile and DevOps are often conflated and confused with each other. It’s often misunderstood where one stops and the other begins. While there are a lot of differences between the two, the short answer is that Agile is a Software Development Life Cycle that provides a methodology for delivering tech products and DevOps is a method to deliver those same technology products to those who need it. Agile When the Agile Manifesto was first written in 2001, it was a response to the waterfall-based methodologies. Waterfall approaches were heavy front-end specifications and hoping you covered everything. Inevitably, you didn’t. [...]

Top Qualities of an Effective IT Leader

Information technology and software development requires incredible creativity and vision. A leader in Information Technology has to really push for excellence and value in their products to make sure that they make a mark on the world. This article digs into some common characteristics we see in strong IT leaders. Having a Vision An IT leader needs to have a clear vision in order to lead his or her company in to the future. That cannot be compromised because tech is a field that is more concrete and less abstract than other fields like social sciences. Hence, the vision [...]

Technology Spotlight: Vulnerability Management and Penetration Testing

Vulnerability management (Blue Team), Penetration testing (Red Team) are like two sides of a coin, one without the other is incomplete. News Flash: When it comes to security, incomplete equals "at risk". We see this duality in every industry where assurance is required.  Such as in industrial design and testing. In the cyber world management must begin with assessing what the potential for damage to brand integrity will be should a breach occur. Loss of customer or public confidence? Loss of trade secrets? Leakage of Personally Identifiable Information? Once management embraces the danger a breach represents to their business, [...]

What Happens During a Cybersecurity Assessment?

When most people think of cybersecurity, they think of anti-virus and firewalls. While that is part of cybersecurity, it is equivalent to thinking of a tire or a windshield when thinking about an automobile. Cybersecurity is the comprehensive ability of an organization to identify, protect, detect, respond and recover from cyberincidents. These cyberincidents have the potential to damage brand integrity through data loss or leakage. Cybersecurity assessments are an important compoent to any greater cybersecurity strategy. This article discusses what happens in a cybersecurity asessment. A Cybersecurity Posture Assessment is standardized process used to define, evaluate, assess and document [...]

Technology Spotlight: Disaster Recovery vs. Business Continuity

Considering the recent wave of disasters, organizations have put contingency plans in place to deal with them. Organizations now want to deal with disasters in a manner, which safeguards their best interests, without requiring a major upheaval. Companies need to consider what they need to do for disaster recovery and business continuity. While they cross over quite a bit, disaster recovery and business continuity are not the same. When it comes to planning for disaster recovery, businesses are confronted by two different methods – Disaster Recovery Plans and Business Continuity Planning. There is a basic difference between both of these [...]