Bridget Farrell

Category //

Bridget Farrell

Codebashing

Codebashing is Checkmarx’s is an in-context eLearning platform that sharpens the skills developers need to fix vulnerabilities and write secure code. Expanding on the “learn by doing” concept, Codebashing teaches developers the principals of secure coding, and helps them sharpen application security

Read More »

Cloud Native Development

The definition of Cloud Native is provided here by the Cloud Native Compute Foundation (CNCF). As such Cloud Native development is the use of technology and practices which supports the creation of a business service (application) inline with this definition.

Read More »

Cloud Native

Cloud native computing is an approach in software development that utilizes cloud computing to “build and run scalable applications in modern, dynamic environments such as public, private, and hybrid clouds”. Technologies such as containers, microservices, serverless functions and immutable infrastructure,

Read More »

Cloud Infrastructure

Encompasses the servers, virtual machines, storage systems, networking, and other components required for cloud computing and infrastructure as a service. Cloud infrastructure provides the building blocks, or primitives, for creating hybrid and private clouds that deliver cloud computing services.

Read More »

Cloud Computing

Cloud computing is an umbrella term for elastic, on-demand, shared computing resources and services– such as computational power, storage capacity, database usage, analytics, and software applications– delivered as a service over the Internet, typically with metered pricing. The organizations that

Read More »

Build Server

A build server is a distinct concept to a Continuous Integration (CI) server. The CI server exists to build your projects when changes are made. By contrast a Build server exists to build the project (typically a release, against a

Read More »

Application Lifecycle Management (ALM)

Application Lifecycle Management systems, or simply management systems are systems in which the entire lifecycle of a certain product or project are being managed. Such systems include the requirements, definitions, backlog and bugs and issue tracking aspect of the developed

Read More »

API Security

APIs expose application logic and sensitive data such as Personally Identifiable Information (PII) and because of this have increasingly become a target for attackers. Without secure APIs, rapid innovation would be impossible. API Security focuses on strategies and solutions to

Read More »

API

Application Programming Interface (API) are a set of functions and procedures allowing the exposure of the data and application services of a solution e.g. business application. APIs are commonly used to automate a series of tasks or operational activities.

Read More »

What the heck is IAST?

The application security testing (AST) world is made up of different solutions, all with one ultimate goal – to protect software from hackers, and their attacks.  SAST and DAST are perhaps the two most common and well-known solutions. In the

Read More »
Skip to content