Skip to main content

Home/ Consitio_20121/ Contents contributed and discussions participated by Gonzalo Gandía

Contents contributed and discussions participated by Gonzalo Gandía

1More

Agilismo at work: Carta de Prácticas Ágiles: Arma tu propio menú ágil - 2 views

  •  
    Agilismo at work - Prácticas ágiles
1More

A Scrum Master is NOT a Project Manager | Code Enigma - 0 views

  •  
    "Scrum Masters can come from Project Management but that's not a guaranteed fit. Business Analysts and team members can also fit the role. A lot of traditional Project Managers struggle with the transition because they're stepping away from a very structured position, one with them at the helm steering the development and the team towards a pre-defined specification. The often overwhelming change controls imposed in traditional waterfall approaches are no longer there to protect the Project Manager from the risks associated with change. Gone is the over-analysing, form filling approach to change. The Product Owner now has to deal with change, often on a daily basis. Those changes don't have to be a big shift but the decisions made to include them can have a big effect on the end product. Being able to make those decisions is important to the flow of the project to make sure that it A product definition can change massively from the beginning of a project. In fact, a product doesn't need to be fully defined at the outset of an Agile project. That scares the pants off the traditionalists! This is where the Scrum Master plays a vital role. While Agile is becoming a part of many projects, there are still many who shy away from it, are nervous of it or just don't trust it. Often, they see the traditional Project Manager role as far easier to understand. What they don't realise are the restrictions imposed by the old role and approach. The Scrum Master has to coach the Product Owner to help them understand how to achieve their goals and how to continually adapt and prioritise their backlog. He is the link between the Product Owner and the team. The team, depending on their experience will often look for guidance and help in solving issues and blockers. The Scrum Master needs to steer the development through these issues, to resolve any problems that are blocking the development and to involve those in the project with the skills and experience to resolve. There is often
1More

http://www.itsmcommunity.org/downloads/Using_the_DICE_Model.pdf - 0 views

  •  
    Using the DICE Model
2More

What CISOs Need to Know about Cloud Computing - 0 views

  • cloud computing isn’t more or less secure than traditional infrastructure – it is different. Some risks are greater, some are new, some are reduced, and some are eliminated
  •  
    A review of how security risks change in cloud computing vs traditional computing
1More

Microsoft Cybersecurity Report - 0 views

  •  
    Top 10 Most Wanted Enterprise Threats
1More

Security risk management - 0 views

  •  
    Where companies fail and succeed 
1More

IT Security and Risk Management - 0 views

  •  
    An Overview
2More

Riesgos de seguridad de software Open Source - 0 views

  • White Source da a conocer, junto con el estudio sobre sus clientes, el Top 5 de vulnerabilidades de seguridad que más se repiten debido a la no actualización de los componentes open source: CVE-2011-2730: Vulnerabilidad en el framework Spring que permite la obtención de información sensible de forma remota.  CVE-2012-0213: Vulnerabilidad  en Apache POI (API en Java para manipular documentos ofimáticos de Microsoft Office) que podría provocar denegación de servicio. CVE-2011-2894: Vulnerabilidad en Spring que permite evadir restricciones de seguridad y ejecutar código de forma remota. CVE-2009-2625: Vulnerabilidad en Apache Xerces2 que permite, a usuarios remotos, provocar una denegación de servicio en la aplicación. CVE-2013-0248: Vulnerabilidad en el componente Commons FileUpload de Apache que permitiría a usuarios locales sobrescribir ficheros
  •  
    Top 5 de vulnerabilidades de seguridad que más se repiten debido a la no actualización de los componentes open source
5More

Advice For Developing Secure Cloud Applications - 0 views

  • Cloud providers should model all of their application's interfaces with threats to multi-tenancy in mind, such as information disclosure and privilege escalation, the report advises. In addition, providers should use a "separate schema" database design when building multi-tenant applications as opposed to adding a "TenantID" column to each table.
  • APIs are the front door into any application, and it is critical that they are properly secured
  • To secure APIs, the report recommends determining whether the APIs can be restricted so that only trusted hosts can call them and ensure that interservice communication is securely authenticated
  • ...1 more annotation...
  • primary threats to cloud computing: data breaches, data leakage, denial-of-service, and insecure application interfaces.
  •  
    Experts Offer Advice For Developing Secure Cloud Applications
1 - 12 of 12
Showing 20 items per page