Intelligent CIO Africa Issue 31 | Page 15

LATEST INTELLIGENCE SECURE ARTIFACT MANAGEMENT: AVOIDING CORPORATE RANSOM S Source Code in the Age of Ransomware Traditionally, business IP was secured on internal servers, with no access from the outside world and no ability for users to make unauthorized changes. However, the increase in adoption and utilization of cloud-based solutions means that critical IP is frequently and inadvertently stored in the public cloud. While most enterprises worry about cloud security, their concerns often focus on common cloud applications that store financial information, HR data or corporate documents. In the age of digital transformation, source code becomes an even greater target and key source of differentiation. Protecting against malicious insiders, direct competitors or bad actors must extend to version management tools. The Rise of Developer Empowerment What’s the potential impact to your organization if a rogue actor were to gain access to your source code, or if they made unauthorized changes, deletions or held your source code ransom? As the recent hack of several gitbased repositories has shown, this scenario is not as far-fetched as it may seem. Before we take a look at potential solutions to address this problem, let’s understand the changes in process and tooling that have brought us to this junction. The empowerment of development organizations is one of the biggest benefits that agile transformation has brought to the table, frequently simplifying the day-to-day activities of the entire development organization and increasing the pace of innovation. A function of this empowerment is that developers select the tooling they wish to use, and are no longer constrained by the dictates of corporate IT. n The adoption of agile practices in development communities significantly increased over the past few years. Download whitepapers free from www.intelligentcio.com/me/whitepapers/ www.intelligentcio.com INTELLIGENTCIO 15