Most organizations don't discover what they have until crisis strikes. Akhil Bhaskar makes the case for software catalogs, scaffolding templates, and the "undifferentiated heavy lifting" that enables teams to move fast without breaking things. When a major security vulnerability hits, how quickly can you answer "How exposed are we?" For most organizations, it's a scramble. For Akhil Bhaskar's team, it took two hours to assess and four hours to fix—even though the Log4j vulnerability affected...
All content for api connections is the property of Jon Scheele and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
Most organizations don't discover what they have until crisis strikes. Akhil Bhaskar makes the case for software catalogs, scaffolding templates, and the "undifferentiated heavy lifting" that enables teams to move fast without breaking things. When a major security vulnerability hits, how quickly can you answer "How exposed are we?" For most organizations, it's a scramble. For Akhil Bhaskar's team, it took two hours to assess and four hours to fix—even though the Log4j vulnerability affected...
In this conversation, Jon Scheele and F5's Community Evangelist, Buu Lam discuss key themes in DevOps resilience and observability. They explore the ongoing shift to multi-cloud strategies, the importance of ecosystem partnerships, and the challenges organizations face in integrating new technologies. The discussion also highlights the significance of resiliency and observability in cybersecurity, emphasizing the need for organizations to be aware of various signals and data points to make in...
api connections
Most organizations don't discover what they have until crisis strikes. Akhil Bhaskar makes the case for software catalogs, scaffolding templates, and the "undifferentiated heavy lifting" that enables teams to move fast without breaking things. When a major security vulnerability hits, how quickly can you answer "How exposed are we?" For most organizations, it's a scramble. For Akhil Bhaskar's team, it took two hours to assess and four hours to fix—even though the Log4j vulnerability affected...