LATEST INTELLIGENCE
SECURE ARTIFACT
MANAGEMENT: AVOIDING
CORPORATE RANSOM
S
Source Code in the Age
of Ransomware
Traditionally, business IP was secured on
internal servers, with no access from the
outside world and no ability for users to
make unauthorized changes. However,
the increase in adoption and utilization of
cloud-based solutions means that critical IP
is frequently and inadvertently stored in the
public cloud.
While most enterprises worry about
cloud security, their concerns often focus
on common cloud applications that
store financial information, HR data or
corporate documents. In the age of digital
transformation, source code becomes
an even greater target and key source of
differentiation. Protecting against malicious
insiders, direct competitors or bad actors
must extend to version management tools. The Rise of Developer Empowerment
What’s the potential impact to your
organization if a rogue actor were to gain
access to your source code, or if they made
unauthorized changes, deletions or held your
source code ransom? As the recent hack of
several gitbased repositories has shown, this
scenario is not as far-fetched as it may seem.
Before we take a look at potential solutions
to address this problem, let’s understand the
changes in process and tooling that have
brought us to this junction. The empowerment of development
organizations is one of the biggest
benefits that agile transformation has
brought to the table, frequently
simplifying the day-to-day activities of
the entire development organization
and increasing the pace of innovation.
A function of this empowerment is that
developers select the tooling they wish to
use, and are no longer constrained by the
dictates of corporate IT. n
The adoption of agile practices in
development communities significantly
increased over the past few years.
Download whitepapers free from www.intelligentcio.com/me/whitepapers/
www.intelligentcio.com
INTELLIGENTCIO
15