Tuesday, November 28, 2023

Security Boulevard Logo

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming Webinars
    • Calendar View
    • On-Demand Webinars
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
    • Techstrong.tv Podcast
    • TechstrongTV - Twitch
  • Library
  • Related Sites
    • Techstrong Group
    • Cloud Native Now
    • DevOps.com
    • Security Boulevard
    • Techstrong Research
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv - Twitch
    • Devops Chat
    • DevOps Dozen
    • DevOps TV
  • Media Kit
  • About
  • Sponsor

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor
Hot Topics
  • DEF CON 31 - Wojciech Reguła’s 'ELECTRONizing MacOS Privacy - A New Weapon In Your Red Teaming Armory’
  • Announcing Hyperproof’s New HyperComply Integration
  • The Necessity of Security Best Practices When Implementing Generative AI
  • Ringleader of Ransomware Group in Ukraine Arrested: Europol
  • CAA for S/MIME Email Certificates
DevOps Security Bloggers Network 

Home » Cybersecurity » DevOps » What Is DevOps Maturity, and How Does It Relate to DevOps Security?

SBN

What Is DevOps Maturity, and How Does It Relate to DevOps Security?

by David Bisson on May 6, 2019

By now, many organizations have turned to DevOps as part of their ongoing digital transformations. This process has not been the same for any two companies. Indeed, organizations have embraced DevOps at their own place, and they’ve invested varying levels of time and budget into their nascent deployments.

AI on ActionSponsorships Available

Such variety has helped shape organizations’ DevOps maturity in terms of their strategy and current capabilities. As an example of this, more than 15 percent of respondents to IDC’s Application Services Survey said that their organization is currently refining and standardizing DevOps capabilities within IT and a few Line of Business (LOB) units. By contrast, 10 percent of survey participants said that their organization is regularly refining its DevOps strategy and capabilities as it applies to all IT and LOB assets.

Instructive in their own right, these findings raise an important question: what exactly is DevOps maturity? In this post, we’ll examine this topic in detail. We’ll also spend some time reflecting on how DevOps maturity synchronizes with DevOps security.

Clarifying DevOps Maturity

The term “DevOps maturity” refers to how much organizations have completed and how much they still have yet to accomplish in their DevOps journey. According to CA Technologies, organizations can use four areas to gauge their level of DevOps maturity. These are as follows:

  1. Culture and Strategy: DevOps is a cultural shift in that it removes boundaries and brings development and operations teams together. Such a transition requires careful planning if it is to be successful in the long term.
  2. Automation: Automation unifies tools in such a way that teams can share them. In DevOps, for instance, automation facilitates continuous delivery and continuous deployment. It also enables teams to be creative and not waste their time working through various repeatable tasks.
  3. Structure and Processes: The (Read more...)

*** This is a Security Bloggers Network syndicated blog from The State of Security authored by David Bisson. Read the original post at: https://www.tripwire.com/state-of-security/devops/devops-maturity-relate-devops-security/

DevOps Unbound Podcast
May 6, 2019May 7, 2019 David Bisson DEVOPS, DevOps Maturity, DevOps Security
  • ← Top Tips On Cyber Security for SMEs
  • “Finding Registry Malware Persistence with RECmd” →

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Wed 29

Building Resilient Organizations Around IT and Cybersecurity

November 29 @ 1:00 pm - 2:00 pm
Dec 07

Improved Patient Experience: What That Means for Your Cybersecurity Posture

December 7 @ 1:00 pm - 2:00 pm
Dec 11

How Boundless Software Accelerated Customer Onboarding With Calico Cloud and Amazon EKS

December 11 @ 11:00 am - 12:00 pm
Dec 11

API Security

December 11 @ 1:00 pm - 2:00 pm
Dec 14

AWS Immersion Day: Securing Your Infrastructure-as-Code With Snyk and HashiCorp

December 14 @ 1:00 pm - 3:00 pm
Dec 19

Optimizing Application Security Effectiveness – Key Findings From the ESG Report

December 19 @ 9:00 am - 10:00 am
Feb 12

Ransomware

February 12, 2024 @ 1:00 pm - 2:00 pm
Mar 11

Securing Open Source

March 11, 2024 @ 1:00 pm - 2:00 pm
May 20

Zero-Trust

May 20, 2024 @ 1:00 pm - 2:00 pm

More Webinars

Subscribe to our Newsletters

TSTV Podcast

Most Read on the Boulevard

Meta Sued for Ignoring its Underage Kids Problem (Because Money)
UK, South Korea Warn of North Korea Supply-Chain Attacks
Small Business Cybersecurity Hampered by Fear of Change, Judgement
Security is an Economically Resilient Market: Strategies for Uncertain Times
AI Gets a Legal Gift for Thanksgiving
A Comprehensive Guide to Software Penetration Testing
Cybersecurity Insurance is Missing the Risk
SOA VS MICROSERVICES – What’s the difference?
The Best Cyber Security Audit Companies across the UK
Webinar: Maximizing SOC Efficiency With Open and Agnostic Security Solutions

Download Free eBook

The State of Cloud Native Security 2020

Industry Spotlight

Meta Sued for Ignoring its Underage Kids Problem (Because Money)
AI and ML in Security Analytics & Intelligence Application Security AppSec Cloud Security Cloud Security Cyberlaw Cybersecurity Data Privacy Deep Fake and Other Social Engineering Tactics DevOps DevSecOps Editorial Calendar Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight Mobile Security Most Read This Week Network Security News Popular Post Regulatory Compliance Securing the Cloud Securing the Edge Security at the Edge Security Awareness Security Boulevard (Original) Security Operations Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threats & Breaches Vulnerabilities Zero-Trust 

Meta Sued for Ignoring its Underage Kids Problem (Because Money)

November 27, 2023 Richi Jennings | Yesterday 0
CISA to Provide Cybersecurity Services to Critical Infrastructure Entities
Cloud Security Cybersecurity Data Security Featured Industry Spotlight IoT & ICS Security Malware Network Security News Security Boulevard (Original) Spotlight Threat Intelligence 

CISA to Provide Cybersecurity Services to Critical Infrastructure Entities

November 20, 2023 Jeffrey Burt | Nov 20 0
FCC’s Got New Rules for SIM-Swap and Port-Out Fraud
Analytics & Intelligence Application Security AppSec Cloud Security Cloud Security Cyberlaw Cybersecurity Data Privacy Data Security Deep Fake and Other Social Engineering Tactics DevOps DevSecOps Editorial Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity & Access Identity and Access Management Incident Response Industry Spotlight Insider Threats IOT IoT & ICS Security Mobile Security Most Read This Week Network Security News Popular Post Ransomware Regulatory Compliance Securing the Cloud Securing the Edge Security at the Edge Security Awareness Security Boulevard (Original) Security Challenges and Opportunities of Remote Work Security Operations Social - Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat Intelligence Threats & Breaches Vulnerabilities Zero-Trust 

FCC’s Got New Rules for SIM-Swap and Port-Out Fraud

November 20, 2023 Richi Jennings | Nov 20 0

Top Stories

Ringleader of Ransomware Group in Ukraine Arrested: Europol
Cloud Security Cybersecurity Data Security Featured Malware Network Security News Security Boulevard (Original) Spotlight Threats & Breaches 

Ringleader of Ransomware Group in Ukraine Arrested: Europol

November 28, 2023 Jeffrey Burt | 1 hour ago 0
AI Gets a Legal Gift for Thanksgiving
AI and Machine Learning in Security AI and ML in Security Cyberlaw Cybersecurity Data Privacy Data Security Editorial Calendar Featured Governance, Risk & Compliance News Regulatory Compliance Security Boulevard (Original) Social - Facebook Social - LinkedIn Social - X Spotlight 

AI Gets a Legal Gift for Thanksgiving

November 28, 2023 Mark Rasch | 3 hours ago 0
UK, South Korea Warn of North Korea Supply-Chain Attacks
Cloud Security Cybersecurity Data Security Endpoint Featured Malware Network Security News Security Boulevard (Original) Spotlight Threat Intelligence Threats & Breaches Vulnerabilities 

UK, South Korea Warn of North Korea Supply-Chain Attacks

November 27, 2023 Jeffrey Burt | Yesterday 0

Security Humor

Randall Munroe’s XKCD ‘Thanksgiving Arguments’

Randall Munroe’s XKCD ‘Thanksgiving Arguments’

Security Boulevard Logo White

DMCA

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: [email protected]

Useful Links

  • About
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • DMCA Compliance Statement
  • Privacy Policy

Related Sites

  • Techstrong Group
  • Cloud Native Now
  • DevOps.com
  • Digital CxO
  • Techstrong Research
  • Techstrong TV
  • Techstrong.tv Podcast
  • DevOps Chat
  • DevOps Dozen
  • DevOps TV
Powered by Techstrong Group
Copyright © 2023 Techstrong Group Inc. All rights reserved.

Integrated Security Data PulseMeter

Step 1 of 7

14%
What percentage of your organization’s security data is integrated into a SIEM or data repository you manage? (Select one)(Required)
What gaps exist in your current SIEM, observability and monitoring systems? (Select one or more)(Required)
ExcellentAbove AverageAverageBelow AveragePoorN.A.
Incident response
Threat hunting
Real-time compliance monitoring
Security controls monitoring
Privacy auditing
Security compliance
Risk assessment or modeling
How are data silos impacting your security operations and compliance? (Select one)(Required)
  • Integrating data across silos
  • Enabling real-time security and compliance reporting
  • Standardizing data schema, such as OCSF or ECS
  • Automate data cleansing and integration into common datastore
  • Integrate organizational data and business logic with security data
  • Stay ahead of threats and privacy data regulations
Which of the following do you currently integrate with security data? (Select one or more)(Required)
What is the size of your company (number of employees)? (Select one)(Required)