Boost security in your organization with the help of Liberating Structures
Many companies still face big challenges to tackle a large number of security challenges in their organization. Whether it be technical challenges or cultural aspects to overcome, things take long to implement and to last in the future. Every challenge requires communication and practical actions…
Great guidelines for successful Bug Bounty programs
Every day automated scripts and hackers probe your internet-facing applications for security holes. In the last years, a lot of commercial companies and not-for-profit organizations have sought ways to engage with the community to let them find bugs and other security vulnerabilities. In return for…
Key topics to decide about centralized versus federated control
Big enterprises that employ a large number of Agile teams to produce software applications face numerous challenges to keep their business healthy. Not only the technical aspects of different applications play a role here, but also a lot of organizational aspects. Think of attracting new talent,…
Get the evil out – don’t run containers as root
Containers are not hot and shiny anymore. They are a common piece of the puzzle when it comes to building great software. But a common pitfall, even now, is that many containers run as root. This poses a security risk. So, get the evil out – don’t run containers as root. Why containers run as root…
The four-eyes principle: what’s important in a DevOps world
DevOps accelerates everything from code to production. Manual approvals for releases and deployments quickly become a thing of the past. DevOps teams need to embrace security and compliance in their day-to-day operations. This is especially true in a heavily regulated environment. Big risks are not…

