Log4J and IBM i

Over the last few months, there have been many blog posts and technical breakdowns written on the vulnerability of the Log4j exploit. There are even memes about it, as it has permeated popular culture with the exploit affecting the highly popular game Minecraft. The Log4J vulnerability is one that had the potential to create mass

Guest Blog: Did WannaCrypt Wreck My Demo Infrastructure?

Security in the cloud will likely always be a hot topic of conversation, especially when there are global events like the recent WannaCrypt ransomware attack. IBM principal architect Erik Anderson recently addressed his responsibility for delivering “a reliable platform available for hundreds of other IBMers” in the midst of attacks like these, and the role

Now Available: Secure and Scalable Docker Development

As more organizations look to containerization for gains in software consistency and efficiency—questions around security often pop up. In the webinar below, we show how combining Twistlock and Skytap provide security and scalability in Docker development environments in particular. After a brief explanation of Skytap and Twistlock technologies, this presentation contains a demo that shows

The DevHops Podcast Ep. 3: How to Test for Enterprise Mobility

Lydia Casillas from Sky I.T. Group joins us for our third episode to discuss the challenges of testing mobile apps and the mobile web to ensure security, usability, and powerful “enterprise mobility.” We also review beers from Stone, Freemont, and Alltech Lexington Brewing & Distilling Co.! Tap In! Noel: Hello, everyone. Welcome to the Skytap

Peeling Back the Layers of the Cloud Security Onion

​I had the chance to sit down with Lee Slaughter, Skytap’s Manager of Information Security, to discuss security in the cloud, the efforts that make up a thorough due diligence when choosing a cloud provider, and how to keep up with external and internal threats to your business. Noel: Last year, Charles Babcock wrote a

Guest Post: Data Quality as an Initiative

​This article was authored by David Guimbellot and was originally published on Orasi’s “Eye on Quality” blog. If your business is capturing or coordinating persistent data as a primary function then it behooves you to create a data quality initiative that improves your Test Data Management (TDM). There are common opportunities in the way that

​The Ethics of Cloud Computing – Part 1

Cloud computing seems to still be one of the reigning buzzwords in high-tech these days. Everything is either “in the cloud”, “powered by the cloud”, or some variation on the theme. I remember when hosted email was just that: hosted email. Today, such offerings are considered cloud offerings even though they have not changed in

Now Available: Removing Barriers to Continuous Delivery of Business Value

​ Many organizations are recognizing that faster application delivery leads to better business results, but they struggle with how to overcome their barriers to faster delivery. In this webinar, guest speaker Kurt Bittner, Principal Analyst at Forrester Research, Inc., discusses the most common barriers to faster delivery and how organizations work to remove those barriers.

Your Healthcare, Your Cloud, and HIPAA

Healthcare companies once considered the idea of managing any computing activities in the cloud a distant future due to ever-tightening standards of patient privacy. But software development and testing workloads are equally as ideal and secure in the cloud for health industry enterprises as other complex businesses. Since the HIPAA Omnibus rule was released, and

On-premises Data Masking for Increased Cloud Testing Security

​ We recently hosted a webinar with one of our partners, Axis Technology, to demonstrate how their DMSuite® tool ensures that sensitive production data remains secure, while also providing testers with “intelligent” datasets that help them provide more complete testing. This webinar provides tips on how on-premises masked test data management addresses security concerns, while

The Heartbleed Security Vulnerability and What It Means for Skytap

You may have heard about the recent security vulnerability known as “Heartbleed.” Researchers have discovered a vulnerability in OpenSSL (a cryptographic software library that protects many services on the Internet) that allows unauthorized access to protected information. Skytap has investigated this issue and determined that our websites, particularly https://cloud.skytap.com, and other publicly exposed services are

Caught! The Real Culprit of Shadow IT

Once you learn the definition of shadow IT, it shouldn’t be too shocking to learn how widespread it is at companies large and small all over the world. I hate to assume, but the odds are, that you yourself have used a non-IT approved SaaS option for the same reason as everyone else, myself included.

Join our email list for news, product updates, and more.