Part 2: Smart Shift Left

In my previous blog post, we discussed the state of the union for shift left and and how many organizations are not implementing correctly.
Recognizing the consequences of a poor shift left model.
Many of the high friction points with a poor shift left model involve developers' interaction with things like security, infrastructure, and observability and their having to understand complex security protocols, threats, and tools.
Developers may have to interact with physical or virtual infrastructure.
Having to instrument tracing, metrics, and logging for applications are a few of the many shift-left-oriented areas that cause toil for developers.
In addition to the technologies, developers must deal with the time it takes to learn new processes, adopt new tools, and interact with new groups.
In addition to providing developers with a streamlined way of learning about the new things they must take care of, there are other practical steps to ease the burden of shift left.
Developers have many tools, technologies, frameworks, SDKs, and communication tools to deal with.
Provide value in the developer tools: High-quality IDE plugins, well-documented and well-implemented automation frameworks, well-supported SDKs, etc.
Engage with the developer community where they are: Educate and enable them at hackathons, dev-centric events, and inside dev-centric forums.
Reduce/remove the developer toil: Cross-environment tooling, in-code API and image checks, reliable API documentation.
Once developers check in code to a CI/CD pipeline, provide the configurations and integrations in the pipeline that keeps things from falling apart.
Provide end-to-end value for the developer, operations teams, and business leaders.
Maintain end-to-end observability for both technical and business insights Conditionally add policy triggers to the insights so that semi-automated or fully automated actions are taken Leverage multi-persona dashboards: Use the same tools, but the view changes for each persona Circular improvement: Value or loss of value finds its way back to the left for retrospective and improvements.
Access to Infrastructure-as-Code, API and SDK documentation, tools, and code Developer and operator learning Secure Application Integrations such as Panoptica's API Gateway integration Secure CI/CD pipeline integration via Panoptica's CI/CD integration Access to live interactive test environments for developers and operators to build and test their automation code, such as the NSO Developer Explorer and NSO Developer Studio End-to-end observability for code, applications, and infrastructure via Cisco Full Stack Observability Achieving a balanced approach to shift left.
While shift left is fundamentally sound and beneficial, it has been stretched beyond its original intent and misused, negatively impacting developers and product quality.
The focus must align towards improving quality, security, and availability by catching issues early - without overburdening our developers or compromising the product's integrity.
You can accomplish this by enabling developers with the training, tools, technologies, and processes.
A balanced approach, incorporating the core principles of shift left without overextending its reach or misusing it to cut corners, will help organizations achieve their goals.
Like any tool, they are only as effective as the hands that wield them.


This Cyber News was published on feedpress.me. Publication date: Wed, 13 Mar 2024 18:13:05 +0000


Cyber News related to Part 2: Smart Shift Left

Part 2: Smart Shift Left - In my previous blog post, we discussed the state of the union for shift left and and how many organizations are not implementing correctly. Recognizing the consequences of a poor shift left model. Many of the high friction points with a poor shift ...
3 months ago Feedpress.me
Smart Home Technology: Your Gateway to Modern Living - Smart home technology offers homeowners an array of benefits, from increased convenience and comfort to enhanced safety and energy savings. Smart home technology offers convenience, comfort, safety, and energy savings. Smart home technology provides ...
6 months ago Securityzap.com
Choosing the Perfect Smart Lock for Your Home Security - Installing a smart lock on your home is like building a wall of protection around it. In this article, we will explore the benefits of using smart locks, different types of technology available, security features offered, factors to consider when ...
6 months ago Securityzap.com
Creating a Smart Home Ecosystem: Seamless Connectivity - Like a finely tuned symphony, creating a smart home ecosystem has the potential to bring harmony and convenience to everyday life. Establishing an interconnected network of digital devices to enable user-controlled automation of various household ...
6 months ago Securityzap.com
Smart Thermostats: Savings and Comfort at Your Fingertips - Smart thermostats offer a modern approach to home temperature control that can provide significant energy savings and enhanced comfort. Smart thermostats offer cost effectiveness, improved indoor air quality, enhanced comfort and convenience, and ...
6 months ago Securityzap.com
Do you love or fear your smart home devices? For most Americans, it's both - Contractor resource Craftjack recently surveyed 800 people in the US to find out how they felt about their smart home gadgets. Also: The best smart home devices, tested and reviewed. Some 32% of those surveyed have six or more smart tech devices in ...
5 months ago Zdnet.com
Smart Home Security Essentials: Protecting What Matters Most - Smart home security systems provide homeowners with the ability to keep their personal and property safe from intruders, theft, and other potential threats. This article will discuss different types of smart home security systems, benefits, setting ...
6 months ago Securityzap.com
CVE-2024-35292 - A vulnerability has been identified in SIMATIC S7-200 SMART CPU CR40 (6ES7288-1CR40-0AA0) (All versions), SIMATIC S7-200 SMART CPU CR60 (6ES7288-1CR60-0AA0) (All versions), SIMATIC S7-200 SMART CPU SR20 (6ES7288-1SR20-0AA0) (All versions), SIMATIC ...
3 weeks ago Tenable.com
DevSecOps: Shifting Security to the Left - This blog explains how Shifting Security to the Left introduces security in the early stages of the DevOps Lifecycle, thus fixing software bugs proactively. Throughout this process, it feels like security has been left behind a little. 'Shifting ...
6 months ago Feeds.dzone.com
CVE-2019-13945 - A vulnerability has been identified in SIMATIC S7-1200 CPU family (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family < V4.x (incl. SIPLUS variants) (All versions), SIMATIC S7-1200 CPU family V4.x (incl. SIPLUS variants) (All ...
3 years ago
How Smart Car is Probably Tracking You? - According to ExpressVPN, there's a concerning number of car manufacturers that collect data on their drivers, and an impressive 84% of them then share or sell this data. Connected to the car's Wi-Fi network, modern smart cars' infotainment systems ...
5 months ago Cybersecuritynews.com
CVE-2023-52764 - In the Linux kernel, the following vulnerability has been resolved: media: gspca: cpia1: shift-out-of-bounds in set_flicker Syzkaller reported the following issue: UBSAN: shift-out-of-bounds in drivers/media/usb/gspca/cpia1.c:1031:27 shift exponent ...
1 month ago Tenable.com
Aim for a modern data security approach - Risk, compliance, governance, and security professionals are finally realizing the importance of subjecting sensitive workloads to robust data governance and protection the moment the data begins traversing the data pipeline. Why current data ...
6 months ago Helpnetsecurity.com
What is App Security? SAST, DAST, IAST, and RASP. - Effective application security relies on well-defined processes and a diverse array of specialized tools to provide protection against unauthorized access and attacks. Security testing is a critical part of an application security strategy and should ...
6 months ago Feeds.dzone.com
Webinar: Solving the Bi-Directional Sync Problem with Microsoft Sentinel and D3 Smart SOAR - Hosted by Microsoft's Eric Burkholder and D3's Pierre Noujeim, we'll have a demo of the integration in action, followed by a discussion on its benefits, and conclude with a Q&A session. If you work at a mature SOC or at an MSSP, you're probably ...
5 months ago Securityboulevard.com
Cobalt's New Report Uncovers a Big Shift in Cybersecurity Strategy - PRESS RELEASE. SAN FRANCISCO, Feb. 14, 2024 /PRNewswire-PRWeb/ - Cobalt, the pioneers of Pentest as a Service, empowering businesses to operate fearlessly and innovate securely, has today announced the release of the inaugural OffSec Shift Report. ...
4 months ago Darkreading.com
New report claims your phone, TV, and smart speaker are spying on you. But is it real? - Last week a 404 Media piece went viral, thanks to an alarming series of allegations about the apparent ability of smart devices to listen in on our conversations. A marketing team within media giant Cox Media Group claims it has the capability to ...
6 months ago Zdnet.com
Unveiling the Unseen Cybersecurity Threats Posed by Smart Devices - The number of smart devices worldwide has surpassed the global population, with a continuous upward trend, particularly amidst remote and hybrid work settings. Ranjit Atwal, Gartner's senior research director, attributes this surge to the increase in ...
6 months ago Cysecurity.news
Sustainability 101: What are smart grids? - Lastly, consumers and businesses are using software and devices to manage electricity usage themselves, including smart thermostats that learn what temperature you prefer and adjust settings throughout the day to minimize energy consumption. ...
5 months ago Feedpress.me
The Shift in Power from CIO to CISO: The Rise in Cyber Attacks Enables Greater Resources and Budget Allocation - Often when we talk about the impact of these cyber threats, we inevitably focus on the wallet as well as how they can tarnish a business's reputation. As a result, we are witnessing the beginnings of a shift in power from the CIO to the Chief ...
6 months ago Cybersecurity-insiders.com
The Shift in Power from CIO to CISO: The Rise in Cyber Attacks Enables Greater Resources and Budget Allocation - Often when we talk about the impact of these cyber threats, we inevitably focus on the wallet as well as how they can tarnish a business's reputation. As a result, we are witnessing the beginnings of a shift in power from the CIO to the Chief ...
6 months ago Cybersecurity-insiders.com
The Shift in Power from CIO to CISO: The Rise in Cyber Attacks Enables Greater Resources and Budget Allocation - Often when we talk about the impact of these cyber threats, we inevitably focus on the wallet as well as how they can tarnish a business's reputation. As a result, we are witnessing the beginnings of a shift in power from the CIO to the Chief ...
6 months ago Cybersecurity-insiders.com
The Shift in Power from CIO to CISO: The Rise in Cyber Attacks Enables Greater Resources and Budget Allocation - Often when we talk about the impact of these cyber threats, we inevitably focus on the wallet as well as how they can tarnish a business's reputation. As a result, we are witnessing the beginnings of a shift in power from the CIO to the Chief ...
6 months ago Cybersecurity-insiders.com
The Shift in Power from CIO to CISO: The Rise in Cyber Attacks Enables Greater Resources and Budget Allocation - Often when we talk about the impact of these cyber threats, we inevitably focus on the wallet as well as how they can tarnish a business's reputation. As a result, we are witnessing the beginnings of a shift in power from the CIO to the Chief ...
6 months ago Cybersecurity-insiders.com
The Shift in Power from CIO to CISO: The Rise in Cyber Attacks Enables Greater Resources and Budget Allocation - Often when we talk about the impact of these cyber threats, we inevitably focus on the wallet as well as how they can tarnish a business's reputation. As a result, we are witnessing the beginnings of a shift in power from the CIO to the Chief ...
6 months ago Cybersecurity-insiders.com

Latest Cyber News


Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)