התחל במצב לא מקוון עם האפליקציה Player FM !
פודקאסטים ששווה להאזין
בחסות


Can DevSecOps Make Developers Happier?
Manage episode 295783158 series 2487640
Author Daniel H. Pink recently examined the factors that lead to job satisfaction among knowledge workers and summarized them in three components: autonomy, skill mastery, and purpose. In this SEI Podcast, Hasan Yasar, technical director of Continuous Deployment of Capability at Carnegie Mellon University’s Software Engineering Institute, relates these components to DevSecOps and summarizes a recent survey affirming that DevSecOps practices do indeed make developers and other stakeholders in their organizations happier.
418 פרקים
Manage episode 295783158 series 2487640
Author Daniel H. Pink recently examined the factors that lead to job satisfaction among knowledge workers and summarized them in three components: autonomy, skill mastery, and purpose. In this SEI Podcast, Hasan Yasar, technical director of Continuous Deployment of Capability at Carnegie Mellon University’s Software Engineering Institute, relates these components to DevSecOps and summarizes a recent survey affirming that DevSecOps practices do indeed make developers and other stakeholders in their organizations happier.
418 פרקים
כל הפרקים
×
1 Understanding Container Reproducibility Challenges: Stopping the Next Solar Winds 25:10

1 Mitigating Cyber Risk with Secure by Design 32:29

1 The Magic in the Middle: Evolving Scaled Software Solutions for National Defense 21:25

1 Making Process Respectable Again: Advancing DevSecOps in the DoD Mission Space 44:26


1 The Best and Brightest: 6 Years of Supporting the President’s Cup Cybersecurity Competition 21:40

1 Updating Risk Assessment in the CERT Secure Coding Standard 26:04

1 Delivering Next Generation Cyber Capabilities to the DoD Warfighter 27:16

1 Getting the Most Out of Your Insider Risk Data with IIDES 39:14

1 Grace Lewis Outlines Vision for IEEE Computer Society Presidency 18:14

1 Improving Machine Learning Test and Evaluation with MLTE 29:06

1 DOD Software Modernization: SEI Impact and Innovation 27:12

1 Securing Docker Containers: Techniques, Challenges, and Tools 39:09

1 An Introduction to Software Cost Estimation 22:55

1 Cybersecurity Metrics: Protecting Data and Understanding Threats 27:00

1 The Cybersecurity of Quantum Computing: 6 Areas of Research 23:01


1 The Product Manager’s Evolving Role in Software and Systems Development 24:19

1 Measuring the Trustworthiness of AI Systems 19:27

1 Actionable Data in the DevSecOps Pipeline 31:58

1 Insider Risk Management in the Post-Pandemic Workplace 47:34

1 An Agile Approach to Independent Verification and Validation 31:57

1 Zero Trust Architecture: Best Practices Observed in Industry 27:53

1 Automating Infrastructure as Code with Ansible and Molecule 39:38

1 Identifying and Preventing the Next SolarWinds 46:04

1 A Penetration Testing Findings Repository 25:47

1 Understanding Vulnerabilities in the Rust Programming Language 36:45

1 We Live in Software: Engineering Societal-Scale Systems 39:31

1 Secure by Design, Secure by Default 54:05

1 Key Steps to Integrate Secure by Design into Acquisition and Development 48:50

1 3 Key Elements for Designing Secure Systems 36:28

1 Using Role-Playing Scenarios to Identify Bias in LLMs 45:07

1 Best Practices and Lessons Learned in Standing Up an AISIRT 38:29

1 3 API Security Risks (and How to Protect Against Them) 19:28

1 Evaluating Large Language Models for Cybersecurity Tasks: Challenges and Best Practices 43:05

1 Capability-based Planning for Early-Stage Software Development 33:55

1 Safeguarding Against Recent Vulnerabilities Related to Rust 26:25

1 Developing a Global Network of Computer Security Incident Response Teams (CSIRTs) 30:51

1 Automated Repair of Static Analysis Alerts 27:05

1 Developing and Using a Software Bill of Materials Framework 37:37

1 Using Large Language Models in the National Security Realm 34:45

1 Atypical Applications of Agile and DevSecOps Principles 33:41

1 When Agile and Earned Value Management Collide: 7 Considerations for Successful Interaction 35:21

1 The Impact of Architecture on Cyber-Physical Systems Safety 34:05

1 ChatGPT and the Evolution of Large Language Models: A Deep Dive into 4 Transformative Case Studies 46:22

1 An Exploration of Enterprise Technical Debt 25:56

1 The Messy Middle of Large Language Models 33:46

1 An Infrastructure-Focused Framework for Adopting DevSecOps 43:35


1 Improving Interoperability in Coordinated Vulnerability Disclosure with Vultron 51:16

1 Asking the Right Questions to Coordinate Security in the Supply Chain 31:11

1 Securing Open Source Software in the DoD 35:33

1 A Model-Based Tool for Designing Safety-Critical Systems 48:43

1 Managing Developer Velocity and System Security with DevSecOps 32:55

1 A Method for Assessing Cloud Adoption Risks 21:47

1 Software Architecture Patterns for Deployability 29:09

1 ML-Driven Decision Making in Realistic Cyber Exercises 48:58

1 A Roadmap for Creating and Using Virtual Prototyping Software 56:30

1 Software Architecture Patterns for Robustness 31:13

1 A Platform-Independent Model for DevSecOps 23:41

1 Using the Quantum Approximate Optimization Algorithm (QAOA) to Solve Binary-Variable Optimization Problems 27:36



1 Challenges and Metrics in Digital Engineering 42:18

1 The 4 Phases of the Zero Trust Journey 34:28


1 Undiscovered Vulnerabilities: Not Just for Critical Software 35:26


1 Model-Based Systems Engineering Meets DevSecOps 34:10

1 Incorporating Supply-Chain Risk and DevSecOps into a Cybersecurity Strategy 31:46

1 Software and Systems Collaboration in the Era of Smart Systems 26:04

1 Securing the Supply Chain for the Defense Industrial Base 18:37

1 Building on Ghidra: Tools for Automating Reverse Engineering and Malware Analysis 23:24

1 Envisioning the Future of Software Engineering 40:11

1 Implementing the DoD's Ethical AI Principles 23:17

1 Walking Fast Into the Future: Evolvable Technical Reference Frameworks for Mixed-Criticality Systems 39:36

1 Software Engineering for Machine Learning: Characterizing and Understanding Mismatch in ML Systems 30:19

1 A Discussion on Automation with Watts Humphrey Award Winner Rajendra Prasad 37:17

1 Enabling Transition From Sustainment to Engineering Within the DoD 31:22

1 The Silver Thread of Cyber in the Global Supply Chain 26:56

1 Measuring DevSecOps: The Way Forward 39:32

1 Bias in AI: Impact, Challenges, and Opportunities 24:58

1 Agile Strategic Planning: Concepts and Methods for Success 29:50

1 Applying Scientific Methods in Cybersecurity 39:49

1 Zero Trust Adoption: Benefits, Applications, and Resources 30:25

1 Uncertainty Quantification in Machine Learning: Measuring Confidence in Predictions 31:40

1 11 Rules for Ensuring a Security Model with AADL and Bell–LaPadula
48:05

1 Benefits and Challenges of Model-Based Systems Engineering 33:10

1 Can DevSecOps Make Developers Happier? 41:17

1 Is Your Organization Ready for AI? 30:20

1 A Stakeholder-Specific Approach to Vulnerability Management 37:11


1 Reviewing and Measuring Activities for Effectiveness in CMMC Level 4 13:13

1 Situational Awareness for Cybersecurity: Beyond the Network 25:35

1 Quantum Computing: The Quantum Advantage 30:34


1 Developing an Effective CMMC Policy 10:25

1 The Future of Cyber: Educating the Cybersecurity Workforce 28:10



1 CMMC Levels 1-3: Going Beyond NIST SP-171 12:56

1 The Future of Cyber: Secure Coding 41:16

1 Challenges to Implementing DevOps in Highly Regulated Environments 38:42



1 Managing Vulnerabilities in Machine Learning and Artificial Intelligence Systems 40:59



1 Mission-Based Prioritization: A New Method for Prioritizing Agile Backlogs 13:18

1 Digital Engineering and DevSecOps 30:45

1 A 10-Step Framework for Managing Risk 30:31

1 7 Steps to Engineer Security into Ongoing and Future Container Adoption Efforts 20:23

1 Ransomware: Evolution, Rise, and Response 32:50

1 VINCE: A Software Vulnerability Coordination Platform 38:14

1 Work From Home: Threats, Vulnerabilities, and Strategies for Protecting Your Network
46:17


1 The CMMC Level 3 Assessment Guide: A Closer Look 13:45

1 The CMMC Level 1 Assessment Guide: A Closer Look 20:37

1 Achieving Continuous Authority to Operate (ATO) 33:29

1 Challenging the Myth of the 10x Programmer 16:51
ברוכים הבאים אל Player FM!
Player FM סורק את האינטרנט עבור פודקאסטים באיכות גבוהה בשבילכם כדי שתהנו מהם כרגע. זה יישום הפודקאסט הטוב ביותר והוא עובד על אנדרואיד, iPhone ואינטרנט. הירשמו לסנכרון מנויים במכשירים שונים.