Page 1 of 1

Analysis of public statements

Posted: Tue Feb 11, 2025 6:55 am
by relemedf5w023
An by Russian security software developers reveals another trend for next year. Information security companies will more actively lobby the interests of the cybersecurity market in government agencies, persuading them not only to adopt the necessary laws, but also to implement the necessary administrative response measures. What this will lead to will not be immediately known. However, the trend itself is undoubtedly encouraging. After all, it is aimed at taking the initiative from criminals, depriving them of the opportunity to be the first to start military actions.

Khiyas Aydemirov (Cross Technologies): “Digitalization will lead to an increase in demand for cybersecurity services”
19.12.2019
IncreaseKhiyas Aydemirov
Khiyas Aydemirov
At the turn of the year, it is customary to sum up the guatemala whatsapp data of the outgoing year and predict the development of events in the coming year. Of greatest interest to the IT community, obviously, are expert assessments of the heads of leading global and Russian IT companies. Here is what Khiyas Aydemirov , COO of Cross Technologies, told itWeek Expert .

What technology trends do you think were the main ones in 2019 in the information security segment?

DevSecOps. The trend this year is the transition from a set of DevOps practices to a model called DevSecOps. DevOps is aimed at active interaction between developers and IT specialists and mutual integration of their work processes into each other. This allows for a continuous development cycle, reduced development time and product quality.

From our point of view, DevSecOps is a set of practices that allow for the management of development and security processes in a flexible development environment, the implementation of security mechanisms, while maintaining the reliability of the classic approach and the flexibility of convergent development environments. Our company has actively joined this trend. We are already developing methods and practices and implementing them in the development processes of our own product, thereby enhancing its reliability, security and trust.