PART 5: DevOps & Cybersecurity Trends

DevOps’ role has evolved over the last few years and continues to apply an all-inclusive approach to software development processes. Cybersecurity has become a business imperative. Check out our tech experts’ opinions on cyberwars, DevOps’ role in software development and other trends.

DevOps:

Jacek Chmiel, Global Chief of Consulting & Technology at IT Services Competence Platform:
DevOps has become an essential part of the software development process, even a major factor in architecture design. There’s no proper software architecture without the DevOps aspect addressed properly. DevOps in the cloud continues to require more skills, as tools become more advanced and cloud capabilities and services grow each month. A key trend in this area is continuous “everything,” meaning full automation of processes. Everyone involved is going to code in multiple languages; the everything-as-a-code trend is moving fast.

Roland Guelle, CTO at Sevenval
While a process of continuous and flexible deployment replaces those gigantic nightly (or weekend) deployments, DevOps is a fundamental aspect these days. The question for 2019 is: Is a special “DevOps role” needed, or will it become a skill for the whole team, either frontend or backend developers? If a specific “DevOps role” is needed to run and maintain a serverless and cloud native setup, then what roles are no longer needed? While team setup and tools are changing, the mantra for the next couple of years is: “you build it, you run it.” Decoupling the tasks of “dev“ and “ops“ won’t fly in 2019.

Lyubomyr Senyuk, CTO & Head of R&D at CoreValue:
When talking about the role of DevOps and its segregation from pure development, I would rather agree with Roland Guelle that at some point a Developer should be able to handle today’s tools and services, treating them as an instrument and not merely as an environment for work, while on the other hand, the tools should be robust and straightforward enough to avoid overcomplicated environments. But there are always differences in maturity level on any team, and psychology-related moments when even a senior needs to narrow down the type of work they are performing, which will ultimately shift the responsibilities within the team.

Cybersecurity:

Jacek Chmiel, Global Chief of Consulting & Technology at IT Services Competence Platform:
Businesses of every size are under attack. National cyberwars are already in place, which involves huge budgets and sophisticated, weaponized techniques. Cybersecurity is no longer a topic for IT departments, but rather for the management board of every enterprise. This year is not going to be any easier than 2018, full of loud headlines highlighting data breaches. IT and organizational investment into security tools and services is bound to be on the rise.

Lyubomyr Senyuk, CTO & Head of R&D at CoreValue:
Nobody has mentioned such an odd concept as a quantum computer, which is fair enough, since for the majority of tech professionals, this is probably more of a science fiction concept then a cybersecurity area. But if quantum computers multiply their power exponentially every year, 2019 will become the year when the hypothetical 144 qubits successor of 72q Google Bristlecone will break symmetric 512b key algorithms. So, again hypothetically, five years from now, 4096 asymmetric RSA will collapse under the power of the 1000+q quantum computer. This is bound to have a direct, immediate impact on our world. Though this assumption looks very optimistic for quantum computers, the cybersecurity apocalypse is not coming in the foreseeable future, since there are traditional algorithms not covered by quantum “master-keys” yet.

Roland Guelle, CTO at Sevenval:
Cybersecurity is essential. Today, small and medium-sized businesses are the focus of attackers. As IT setups become increasingly complex, paid crackers and black hat hackers are gaining multiple new vectors for their attacks. One consequence of this development is that the task of cybersecurity is transferred from IT departments (the company firewall) to management. If sensitive data is leaked or a security issue with your app gets into the public spotlight, you will lose your customers’ trust, which of course can lead to severe repercussions for your business. Cyber insurance and cyber experts are needed to prepare for security incidents, and they should have direct access to the management.

The next part of the Technology Trends blog series will explore ERP and CRM trends. Follow our LinkedIn feed to stay updated!

Back to PART 4
Forward to PART 6

Recommended articles
array(0) { }
Great time for global network celebrating our shared values and vision.
The IT Services Competence Platform, a global capital group being assembled by Oaktree Capital Management and Cornerstone Partners, is welcoming a new member: Sevenval Technologies,…
Awards and Recognition
Certificates and membership of IT Kontrakt Group
Offer Inquiry
Copyright © 2019 by IT Kontrakt. All Rights Reserved.

By browsing this website you grant your consent to have your personal data which you entered while using the Service, and other parameters recorded in cookie files. stored on the device used for browsing the website, processed for marketing purposes, including profiling, and analytical purposes by “IT KONTRAKT” Sp. Z. o.o., with its registered office in Wrocław, ul. Gwiaździsta 66, 53-413 Wrocław, and Trusted Partners of IT KONTRAKT Sp. z o.o.