Software Bill of Materials (SBoM) - Does It Work for DevSecOps?

There has been much discussion of a “software bill of materials” (SBoM) lately, for use when addressing security vulnerabilities. Many are curious, wanting to learn more. Googling the term gives lots of positive descriptions. This post will go negative, describing problems with the concept.


15 Examples of Brands That Deliver Proactive Support and How to Learn From Them

Customer support is a make or break service for a business that differs by region. While 24/4 live chats and support phone numbers that connect to skilled agents and managers are the most direct ways to communicate with your audience, it helps to also practice proactive support techniques.


How To Boost Your Creativity The Einstein Way-With Combinatory Play

It’s been more than 2,200 years since Archimedes ran naked through the streets of Sicily shouting, “Eureka!” (“I’ve found it!”), but there’s still a lot we could learn from that moment. As the legend goes, the Greek mathematician figured out how to prove the king’s crown was not pure gold—and discovered the principle of buoyancy—when he happened to take a bath and notice water overflowed from the tub as he submerged his body.


The role of SIEM in PCI DSS compliance

Studies have shown a direct correlation between data breaches and non-compliance. This isn’t to say that compliant companies never get breached, but to reinforce the importance of incident detection and response. Businesses have begun to realize the devastating consequences of data breaches—their finances and reputation are at stake, so many have been taking steps over the last few years to comply with the PCI DSS. The main goal is often an emphasis on achieving continuous compliance.


How SAS Visual Analytics' automated analysis takes customer care to the next level - Part 3

In the second of three posts on using automated analysis with SAS Visual Analytics, we used the automated analysis object to get a better understanding of our variable of interest, X-Sell and Up-sell Flag, and how it is influenced by other variables in our dataset. In this third and final post, you'll see how to filter the data even more to set up your customer care workers for success.


Increased Visibility to Manage the New Java Release & Support Model

According to Oracle, Java is a fast, secure and reliable programming language and computing platform first released by Sun Microsystems in 1995. There are lots of applications and websites that will not work unless Java is installed, and more are created every day. From laptops to datacenters, game consoles to scientific supercomputers, cell phones to the Internet, Java is everywhere.


Adding CVE scanning to a CI/CD pipeline

A Docker image contains an application and all its dependencies. As it also contains the numerous binaries and libraries of an OS, it’s important to make sure no vulnerabilities exist in its root filesystem, or at least no critical or major ones. Scanning an image within a CI/CD pipeline can ensure this additional level of security.