How software engineering will evolve in 2024

From artificial intelligence and digital twin technologies, to platform engineering rooted in devops principles, to chaos engineering techniques that enhance resilience, to the expanded use of internal developer portals that boost productivity, innovations are combining to revolutionize every facet of software engineering.
Various forms of AI are steadily infiltrating application development tools and devops platforms.
So far AI has been integrated into development tools faster than it has into devops platforms, potentially leading to an imbalance.
The growth of codebases is outstripping the ability of devops teams to keep pace.
Next-generation devops platforms, infused with AI and operating in the cloud, are on the horizon.
By early 2024, devops teams will be able to deploy applications using natural language interfaces to engage large language models.
Devops teams will soon benefit from higher levels of abstraction through visual interfaces that simplify devops workflow management.
The ultimate objective is to provide a level of abstraction for devops environments that eliminates much of the complexity.
In essence, devops is on the cusp of a digital transformation, like the modernization we've witnessed in many other processes.
Devops hinges as much on culture as it does on tools and platforms.
Platform engineering has emerged as a methodology to centralize devops processes and workflow management.
Advocates for platform engineering argue for the elimination of redundant devops platforms in favor of a unified CI/CD platform that serves as a corporate standard.
A developer portal provided by a platform engineering team well-versed in devops best practices empowers developers to self-service their needs within clearly defined boundaries, elevating code quality and security.
The primary motivation behind investing in platform engineering is to boost developer productivity, a crucial consideration in the current challenging economic climate where attracting and retaining developers has become increasingly difficult.
Chaos engineering has emerged as a devops discipline that rigorously tests the capability of distributed computing systems to withstand unforeseen disruptions.
By systematically revealing weaknesses, Chaos engineering gives devops teams profound insights into their application environments, which can be harnessed to enhance everything from cybersecurity to cost efficiency.
The challenge lies in seamlessly integrating chaos engineering tools and platforms into existing devops workflows without causing downtime for organizations.
Collectively, AI, digital twins, platform engineering, internal developer portals, and chaos engineering promise to dramatically transform software engineering.
It's a transformation of devops that mirrors the digital transformation of countless other processes.
The challenge, as always, will be adapting to the accelerated pace of technological and process innovation within devops cultures.


This Cyber News was published on www.infoworld.com. Publication date: Tue, 26 Dec 2023 10:13:30 +0000


Cyber News related to How software engineering will evolve in 2024

Social Engineering Attacks: Tactics and Prevention - Social engineering attacks have become a significant concern in today's digital landscape, posing serious risks to the security and sensitive information of individuals and organizations. By comprehending these tactics and implementing preventive ...
9 months ago Securityzap.com
Social Engineering: The Art of Human Hacking - Social engineering exploits this vulnerability by manipulating human psychology and emotions to gain unauthorized access to systems and data. Rather than directly breaking cyber defenses, social engineering tactics exploit human vulnerabilities - ...
11 months ago Offsec.com
Affirm says cardholders impacted by Evolve Bank data breach - Buy now, pay later loan company Affirm is warning that holders of its payment cards had their personal information exposed due to a data breach at its third-party issuer, Evolve Bank & Trust. Evolve is a large financial services provider specializing ...
4 months ago Bleepingcomputer.com
How software engineering will evolve in 2024 - From artificial intelligence and digital twin technologies, to platform engineering rooted in devops principles, to chaos engineering techniques that enhance resilience, to the expanded use of internal developer portals that boost productivity, ...
10 months ago Infoworld.com
Evolve Bank Shares Data Breach Details as Fintech Firms Report Being Hit - Fintech companies Wise and Affirm have revealed that the recent data breach suffered by Evolve Bank impacts some of their customers. The notorious ransomware group LockBit recently threatened to leak data allegedly stolen from the US Federal Reserve. ...
4 months ago Securityweek.com
Fintech company Affirm says Evolve Bank attack exposed customer info - Financial technology company Affirm told regulators this week that a cyberattack on a banking partner exposed customer information. Affirm - which runs one of the biggest buy now, pay later platforms - told the Securities and Exchange Commission on ...
4 months ago Therecord.media
Fintech Frenzy: Affirm & Others Emerge as Victims in Evolve Breach - A ransomware attack against a large financial services provider has become a problem for many companies it works with, two of which have already alluded to potential negative impacts on customer data. The infamous LockBit group earned some undue ...
4 months ago Darkreading.com
Vulnerability Summary for the Week of November 27, 2023 - PrimaryVendor - Product apple - multiple products Description A memory corruption vulnerability was addressed with improved locking. Published 2023-12-01 CVSS Score not yet calculated Source & Patch Info CVE-2023-48842 PrimaryVendor - Product dell - ...
11 months ago Cisa.gov
What Is Software Piracy? - Software piracy has become a worldwide issue, with China, the United States and India being the top three offenders. In 2022, 6.2% of people worldwide visited software piracy websites. Software piracy doesn't require a hacker or skilled coder. Any ...
11 months ago Pandasecurity.com
Hacker Conversations: Stephanie 'Snow' Carruthers, Chief People Hacker at IBM X-Force Red - Social engineering is effectively hacking human thought processes. Social engineering is a major factor in the overall process but is not directly part of repurposing electronic systems. A social engineer is usually classified as a hacker, and is ...
8 months ago Securityweek.com
LockBit Attack Targets Evolve Bank, Not Federal Reserve - Evolve Bank, a financial institution headquartered in Arkansas, was the victim of an attack by the LockBit ransomware group which resulted in a data leak onto the Dark Web this week. LockBit had drawn attention to itself earlier this week after ...
4 months ago Darkreading.com
The Crucial Need for a Secure Software Development Lifecycle in Today's Digital Landscape - In today's increasingly digital world, software is the backbone of business operations, from customer-facing applications to internal processes. The rapid growth of software development has also made organizations more vulnerable to security threats. ...
10 months ago Cyberdefensemagazine.com
12 Software Dev Predictions for Future - Predicting the future of software development trends is always a tough call. Such trends will also rule the future of the software development industry. Analyzing these future software development trends will put enthusiasts ahead of the competition. ...
10 months ago Feeds.dzone.com
Review: Engineering-grade OT security: A manager's guide - Rew Ginter is a widely-read author on industrial security and a trusted advisor for industrial enterprises. He holds a BSc. in Applied Mathematics and an MSc. in Computer Science from the University of Calgary. He developed control system software ...
10 months ago Helpnetsecurity.com
New "MITRE ATT&CK-like" framework outlines software supply chain attack TTPs - A new open framework seeks to outline a comprehensive and actionable way for businesses and security teams to understand attacker behaviors and techniques specifically impacting the software supply chain. The Open Software Supply Chain Attack ...
1 year ago Csoonline.com
Understanding SBOMs - In recent years, the adoption of open-source software in development has surged, now comprising up to 90% of what's built. There is a crucial aspect to consider when integrating open-source software components. To make sure their software is safe, ...
11 months ago Securityboulevard.com
Combatting Social Engineering - One popular cyber-attack method known as social engineering leverages human psychology to gather information and perform attacks instead. Social engineering is the psychological manipulation of people into performing actions or divulging confidential ...
10 months ago Cyberdefensemagazine.com
Federal Reserve "breached" data may actually belong to Evolve Bank - A shockwave went through the financial world when ransomware group LockBit claimed to have breached the US Federal Reserve, the central banking system of the United States. You can imagine that everyone was anticipating the end of the countdown that ...
4 months ago Malwarebytes.com
How Patch Management Software Solves the Update Problem - I've never met an IT leader who doesn't know how important patch management is. At Heimdal, we believe patch management software provides the solution to this problem. Patch management software is a technology that allows businesses to automate the ...
4 months ago Heimdalsecurity.com
Consumer Software Security Assessment: Should We Follow NHTSA's Lead? - The US National Highway Traffic Safety Administration is dedicated to its mission: "To save lives, prevent injuries, and reduce economic costs due to road traffic crashes, through education, research, safety standards, and enforcement." Is it time to ...
11 months ago Darkreading.com
Protecting credentials against social engineering: Cyberattack Series - Our story begins with a customer whose help desk unwittingly assisted a threat actor posing as a credentialed employee. In this fourth report in our ongoing Cyberattack Series, we look at the steps taken to discover, understand, and respond to a ...
11 months ago Microsoft.com
Essential Features of Cybersecurity Management Software for MSPs - Protect your clients' businesses from cyber threats with Cybersecurity Management Software. A vital tool that aids MSPs in enhancing their cybersecurity practices is Cybersecurity Management Software. In this article, we will delve into the features ...
5 months ago Hackread.com
92% of companies eyeing investment in AI-powered software - In 2024, buyers are increasingly focused on cost efficiency, AI functionality, and enhanced security, according to Gartner. The report reveals that 61% of buyers are seeking upgrades for more functionality in their recently purchased software. The ...
9 months ago Helpnetsecurity.com
CVE-2017-8147 - AC6005 V200R006C10SPC200,AC6605 V200R006C10SPC200,AR1200 with software V200R005C10CP0582T, V200R005C10HP0581T, V200R005C20SPC026T,AR200 with software V200R005C20SPC026T,AR3200 V200R005C20SPC026T,CloudEngine 12800 with software V100R003C00, ...
6 years ago
Unlocking the Potential of a HighPerforming Security Engineering Group - Security teams are mainly made up of roles related to operations, compliance, and policy. Security engineering teams, on the other hand, are responsible for creating services, automating processes, and streamlining deployments to support the core ...
1 year ago Csoonline.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)