Technology has made great leaps in the past few years. Think about the difference in your personal devices from 2015 to now — in 2015 your smartphone didn’t have facial recognition, and you didn’t have to be careful saying the word “Alexa” in a friend’s home, lest you wake up an Amazon Echo.
It's a truism often tossed around among software engineers: the faster you can find a bug, the cheaper it is to fix it. Lately, we've been publishing a series about DevOps — the combination of development and operations teams, de-siloing IT, embracing automation and extending agile development practices past development and across the applications lifecycle. Speed is a huge benefit of DevOps — when workflows are automated, code is released faster.
Five things. If you want to see an interesting cross-section of culture go to YouTube.com and search on "five things". Dogs. Beauty tips. Snipers. Things guys do that girls hate. Things girls do that guys love. Things found underwater that no one can explain. Five things might be enough to cover some of those topics. We're looking at software security. Five things is barely enough to get started. A good start is better than not starting, so five things it is.
Internet of Things
Amazon Web Services (AWS) launched a new service this year to help people work with internet connected devices, also known as Internet of Things. Things are a thing, and they actually call these devices "Things" in their service. There is a lot of interest in connecting things to the internet these days, and while times are still early, vendors like Amazon have staked a claim as to a) what they believe they can offer and b) what is important going forward that is missing from many implementations. Of these the biggest is security.
Information security is one of those topics that everyone is concerned about but no one really wants to deal with. Yet, you can play the “what if” scenarios in your head until they keep you up at night. There is a constant war going on between those who have information, and those who are seeking to steal it. Gone are the days of having a group password posted on the wall for an application that only a handful of people use. Gone are the days when careless coding mistakes are only noticed by the original developer and ignored. Gone are the days when information security is given a back seat, when the thought of security risks rarely enters the development process.