Infosecurity – (International) Most data breaches come from within. While the data breach events that catch headlines are the work of hacking collectives and professional malware writers, it turns out that the vast majority of information compromises are caused by companies’ own unwitting employees. According to new research from Forrester, only 25 percent of data […]
Note: This post was inspired by Manfred’s post “You don’t do repository driven development? Where have you been?”. It immediately made me think of Star Trek… When I roll up to a new client in desperate need of build help, there’s always a chance I’ll have a “Scotty moment” – a moment when I pick […]
Infosecurity – (International) IBM: Top threats include data breaches, BYOD, browser exploits. When it comes to trends in security for 2012 so far, the landscape has seen a sharp increase in browser-related exploits, like recent ones for – 15 – Internet Explorer and Java, along with renewed concerns around social media password security and continued […]
Companies all over the place are trying to convert existing deployment scripts over to automated systems like Puppet and Chef. Many of the systems I’ve seen in the past few months have very complex codebases, builds that take 40 minutes to execute, and deployments that span hundreds of VM instances on public clouds like Amazon […]
Technology Review – (International) Stuxnet tricks copied by computer criminals. Experts indicate the techniques used in sophisticated, statebacked malware are trickling down to less-skilled programmers who target regular Web users and their online accounts or credit card details. State-sponsored malware became widely known in 2010 with the discovery of Stuxnet, a program targeted at Iranian […]
Sonatype will be exhibiting at JavaOne 2012 in San Francisco from October 1-3 at Hilton Union Square, and we can’t wait. Be sure to swing by our booth (#5508) to run into the likes of Jason van Zyl, Brian Fox, Igor Fedorenko and Manfred Moser, who will be on-hand to help answer your questions. We’ll […]
Our Philadelphia Breakfast Meetup is next Tuesday, September 25 from 8:30AM-10:30AM and only a few seats remain. Don’t miss out! Jason van Zyl, Sonatype CTO and creator of Maven will be teaming up with Joel Confino, a Senior Consultant at Chariot Solutions and they’ll be giving informal talks to show you how you can dramatically […]
When training the Maven Fundamentals or Advanced Maven Techniques classes or reading the Apache Maven users mailing list, it seems that again and again Maven 2 pops up. Sometimes even the long dead Maven 1 creeps up now and then. Usually my first two questions to somebody using Maven 2 are Why? and Are you sure?
Help Net Security – (National) Data breaches expose 94 million records in the government sector. An analysis of government breach data shows that the government sector reported 268 incidents of data breaches from January 1, 2009 to May 31, 2012, which exposed more than 94 million records containing personally identifiable information (PII), according to Rapid7. […]
At Sonatype, the stakes are high, and so our standards must be as well. We toil over every detail of the product, tweaking, refining, until we get things just right.