Tuesday, May 30, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About Us
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • BSidesSF 2023 - Mike Kiser - New Face, Who Dis? Recent Adversarial Approaches to Facial Recognition
  • Why Cloud Did Not Kill the Data Center
  • Randall Munroe’s XKCD ‘The Six Platonic Solids’
  • ‘Predator’ — Nasty Android Spyware Revealed
  • 9 Common IAM Risks & How to Mitigate Them
DevOps Security Bloggers Network 

Home » Cybersecurity » DevOps » 5 Common DevOps Transition Mistakes to Avoid

SBN

5 Common DevOps Transition Mistakes to Avoid

by David Bisson on May 20, 2018

When transitioning to a DevOps model, organizations must remember that people are essential to a successful switchover. It’s people who must learn new workflows, collaboration techniques, and tools during the move. This process will cause at least some disruption over a period as long as two years. Needless to say, they will need patience and ample support to get through such a substantial change.

DevOps ConnectSponsorships Available

Fortunately, organizations can help their people acclimate to the new way of doing things. They can start by identifying key stakeholders and pitching their plan for the transition. By listening to that feedback, enterprises can make sure everyone is on the same page and shape their plan accordingly to avoid common obstacles during the transition process.

Here are five problems in particular to avoid when changing over to DevOps.

1. Define Your Success Criteria

Organizations need a firm idea of why they’re implementing DevOps and what they hope it will mean for the company. In other words, they need a goal in mind against which they can measure the progress of and propose changes to the transition. Companies can achieve this end by asking development, operations and QA to fill out a questionnaire in which they’re given an opportunity to define DevOps, express what privileges they’re willing to lose and/or take on as well as propose boundaries that they feel should separate DevOps systems from the rest of the organization.

2. Neglecting to Emphasize the Cultural Shift

Important as they may be, tools only represent roughly %25 of the change to a complete DevOps model. The majority of the change comes down to a shift in company culture. What makes up the rest are changes to an enterprise’s culture. That is, companies must invest in the human side of things to help create channels of communication (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at: https://www.tripwire.com/state-of-security/devops/5-common-devops-transition-mistakes-to-avoid/

May 20, 2018May 21, 2018 David Bisson Accountability, change, DEVOPS
  • ← masscan, macOS, and firewall
  • 3 Key Challenges To Being PCI 3.2 Compliant and How To Resolve Them →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Tue 30

Simplify, Secure, Strengthen: Implementing Zero-Trust Across Your Endpoints

May 17 @ 1:00 pm - July 12 @ 2:00 pm
Jun 05

Securing Open Source

June 5 @ 1:00 pm - 2:00 pm
Jun 08

ActiveState Workshop: Building Secure and Reproducible Open Source Runtimes

June 8 @ 1:00 pm - 2:00 pm
Jun 13

Uncovering the Hidden Cybersecurity Threat in Your Organization

June 13 @ 1:00 pm - 2:00 pm
Jun 14

Enrich Security Investigations With ServiceNow Asset Data in Snowflake

June 14 @ 3:00 pm - July 24 @ 4:00 pm
Jun 15

Securing Containers & Kubernetes With AWS And Calico

June 15 @ 3:00 pm - 4:30 pm
Jun 22

Strange Bedfellows: Software, Security and the Law

June 22 @ 11:00 am - 12:00 pm
Jun 22

Sneak Peek: Cloud Security Prioritized With Sonrai

June 22 @ 1:00 pm - 2:00 pm
Jun 22

Unleash the Potential of Your Log and Event Data, Including AI’s Growing Impact

June 22 @ 3:00 pm - 4:00 pm
Jul 24

Identity and Access Management

July 24 @ 1:00 pm - 2:00 pm

More Webinars

Subscribe to our Newsletters

TSTV Podcast

Most Read on the Boulevard

COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT
Revolutionize Zero-Trust Security With a Converged Identity Platform
Federal Appellate Court Approves ‘Pretext’ Border Search
Consumers Wary of Biometric Security
‘Predator’ — Nasty Android Spyware Revealed
Is Your SIEM Strategy Failing You? Here’s Why AI-Powered XDR Might Be The Answer
What are FedRAMP Requirements? (And Who Needs to Know)
Phishing Domains Tanked After Meta Sued Freenom
BSidesSF 2023 – Leif Dreizler – Tracking Meaningful Security Product Metrics
Utilizing SEC Cybersecurity Rule and CISA Directive | anecdotes

Download Free eBook

The State of Cloud Native Security 2020

Industry Spotlight

‘Predator’ — Nasty Android Spyware Revealed
Analytics & Intelligence API Security Cyberlaw Cybersecurity Data Security Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Incident Response Industry Spotlight Malware Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

‘Predator’ — Nasty Android Spyware Revealed

May 30, 2023 Richi Jennings | 5 hours ago 0
Dell Launches Project Fort Zero Service to Accelerate Zero-Trust IT Shift
Cybersecurity Data Security Featured Governance, Risk & Compliance Incident Response Industry Spotlight News Security Boulevard (Original) Spotlight 

Dell Launches Project Fort Zero Service to Accelerate Zero-Trust IT Shift

May 23, 2023 Michael Vizard | May 23 0
Facebook Fined $1.3B — Zuckerberg Furious in GDPR Fight
Application Security Cloud Security Cloud Security Cyberlaw Cybersecurity Data Security DevOps Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Security Awareness Security Boulevard (Original) Security Operations Social Engineering Spotlight Threats & Breaches 

Facebook Fined $1.3B — Zuckerberg Furious in GDPR Fight

May 22, 2023 Richi Jennings | May 22 0

Top Stories

COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT
Analytics & Intelligence API Security Cloud Security Cyberlaw Cybersecurity Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response IOT IoT & ICS Security Malware Most Read This Week Network Security News Popular Post Security Boulevard (Original) Security Operations Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

COSMICENERGY: ‘Russian’ Threat to Power Grids ICS/OT

May 26, 2023 Richi Jennings | 4 days ago 0
Federal Appellate Court Approves ‘Pretext’ Border Search
Cyberlaw Cybersecurity Data Security Featured Governance, Risk & Compliance Identity & Access News Security Boulevard (Original) 

Federal Appellate Court Approves ‘Pretext’ Border Search

May 26, 2023 Mark Rasch | 4 days ago 0
U.S.-South Korea Forge Strategic Cybersecurity Framework
Cybersecurity Featured Governance, Risk & Compliance News Security Boulevard (Original) Spotlight Threat Intelligence 

U.S.-South Korea Forge Strategic Cybersecurity Framework

May 25, 2023 Christopher Burgess | May 25 0

Security Humor

Randall Munroe’s XKCD ‘The Six Platonic Solids’

Randall Munroe’s XKCD ‘The Six Platonic Solids’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.