By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Sécurité Helvétique News | AmyrisSécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
  • Home
  • Compliance
    Compliance
    Show More
    Top News
    Shifting Sands: Leaders Are Feeling the Pressure of an Uncertain, Dynamic Risk Landscape
    23 February 2023
    How to Stay Ahead of Mobility Tax & Compliance Trends
    23 January 2024
    The Long and Winding Road to Custom-AI Compliance
    2 August 2024
    Latest News
    How 2025 Redefined Telemarketing Compliance
    1 December 2025
    Advice for the AI Boom: Use the Tools, Not Too Much, Stay in Charge
    25 November 2025
    Strange Bedfellows: How a Supreme Court Ruling Found Its Perfect Match in the Trump Administration
    19 November 2025
    Where in the Loop? Testing AI Across 120 Compliance Tasks to Find Out Where Humans Are Most Needed
    13 November 2025
  • Cyber Security
    Cyber Security
    Show More
    Top News
    China-Linked Group Breaches Networks via Connectwise, F5 Software Flaws
    22 March 2024
    New ZenHammer Attack Bypasses Rowhammer Defenses on AMD CPUs
    28 March 2024
    Money-making bots, and Incognito isn’t private • Graham Cluley
    4 April 2024
    Latest News
    North Korean Hackers Target Developers with Malicious npm Packages
    30 August 2024
    Russian Hackers Exploit Safari and Chrome Flaws in High-Profile Cyberattack
    29 August 2024
    Vietnamese Human Rights Group Targeted in Multi-Year Cyberattack by APT32
    29 August 2024
    2.5 Million Reward Offered For Cyber Criminal Linked To Notorious Angler Exploit Kit
    29 August 2024
  • Technology
    Technology
    Show More
    Top News
    Best Electric Lawn Mower Deals: Save Hundreds on Incredible Mowers From Your Favorite Brands
    12 May 2024
    Humane is looking for a buyer after the AI Pin’s underwhelming debut
    22 May 2024
    Microsoft Recall Alternatives That Remember Everything on Your Screen: Windrecorder, Rewind
    31 May 2024
    Latest News
    Why XSS still matters: MSRC’s perspective on a 25-year-old threat  | MSRC Blog
    9 September 2025
    Microsoft Bug Bounty Program Year in Review: $13.8M in Rewards | MSRC Blog
    28 August 2025
    Microsoft Bounty Program Year in Review: $16.6M in Rewards  | MSRC Blog
    27 August 2025
    postMessaged and Compromised | MSRC Blog
    26 August 2025
  • Businness
    Businness
    Show More
    Top News
    UK salad shortages to last ‘for weeks’, retailers warn
    21 February 2023
    Europe and Asia stocks fall further after Wall Street sell-off
    22 February 2023
    US stocks edge up despite rate rise worries
    23 February 2023
    Latest News
    AI labs like Meta, Deepseek, and Xai earned worst grades possible on an existential safety index
    6 December 2025
    Visa is moving its European headquarters to London’s Canary Wharf, FT reports
    5 December 2025
    Client Challenge
    4 December 2025
    Binance names cofounder Yi He as new co-CEO
    3 December 2025
  • ÉmissionN
    Émission
    Cyber Security Podcasts
    Show More
    Top News
    Kivucast. Private Equity Firm Cyber Safety. Gary Alterson, Kivu & Chad Allan Neale.
    10 July 2024
    Stream episode Identity Belongs To You. Explaining Identity Security Posture Management (ISPM). Dor Fledel, Okta. by Cybercrime Magazine podcast
    18 July 2024
    Cybercrime News For Jul. 25, 2024. Security Firm Mistakenly Hires Hacker. WCYB Digital Radio.
    26 July 2024
    Latest News
    Stream episode Cybercrime Magazine Update: Cybercrime In India. Sheer Volume Overwhelming Police Forces. by Cybercrime Magazine podcast
    3 March 2025
    Autonomous SOC. Why It’s A Breakthrough For The Mid-Market. Subo Guha, SVP of Product, Stellar Cyber
    2 March 2025
    Cyber Safety. Protecting Families From Smart Toy Risks. Scott Schober, Author, "Hacked Again."
    2 March 2025
    Cybercrime News For Feb. 25, 2025. Hackers Steal $49M from Infini Crypto Fintech. WCYB Digital Radio
    2 March 2025
Search
Cyber Security
  • Application Security
  • Darknet
  • Data Protection
  • network vulnerability
  • Pentesting
Compliance
  • LPD
  • RGPD
  • Finance
  • Medical
Technology
  • AI
  • MICROSOFT
  • VERACODE
  • CHECKMARKX
  • WITHSECURE
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Reading: 3 Ways Software Engineers Can Save Time and Eliminate DevOps Waste
Share
Sign In
Notification Show More
Font ResizerAa
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Font ResizerAa
  • Home
  • Compliance
  • Cyber Security
  • Technology
  • Business
Search
  • Home
    • Compliance
    • Cyber Security
    • Technology
    • Businness
  • Legal Docs
    • Contact us
    • Disclaimer
    • Privacy Policy
    • About us
Have an existing account? Sign In
Follow US
  • Amyris
  • Contact
  • Disclaimer
  • Privacy Policy
  • About us
© 2023 Sécurité Helvétique par Amyris Sarl.
Sécurité Helvétique News | Amyris > Blog > Application Security > 3 Ways Software Engineers Can Save Time and Eliminate DevOps Waste
Application Security

3 Ways Software Engineers Can Save Time and Eliminate DevOps Waste

webmaster
Last updated: 2023/02/23 at 10:20 PM
webmaster
Share
12 Min Read
SHARE

As software engineers, we are incredibly busy. We’re designing new features, writing tests and implementing code, debugging, opening pull requests, and performing code reviews. That’s not to mention all of the DevOps stuff that our teams have us doing nowadays, too. Oh yes, and then there are stand-ups, check-ins, one-on-ones, and all-hands. 

The thing is: you don’t have time to waste. If there is wasted time in your workweek, it’s worth looking into how to recapture that time. 

You may find yourself performing a task while asking at the same time, “Why am I spending my time doing this, of all things? Something is wrong here. I’ve got better things to do.” 

In this post, we’re going to cover what some of those time-wasting and motivation-draining tasks are. We’ll consider how you (or your project or your team) got into that mess in the first place. Then, we’ll look at how a unified platform can help you recapture that wasted time. 

Let’s dive in and not waste any more time, shall we? 

1. Patching bugs that shouldn’t have gone to production 

At times, software developers are called upon with urgency to patch a bug that’s live in production. It’s stressful, but it’s understandable. Occasionally, bugs in the application code will sneak their way past our tests and make their way to production. That’s just reality. 

However, certain kinds of bugs leave us feeling not just stressed, but incredibly frustrated—these are the bugs that we know shouldn’t have gotten out to production in the first place. Fixing these bugs can feel like a slog. What kinds of bugs are we talking about? 

Bugs resulting from poor tests 

If your test coverage is spotty, then bugs will slip through the cracks. Perhaps you’ve written tests for your “add user” and “delete user” endpoints, but you never got around to writing tests for the “update user” endpoint. When a bug in that endpoint code makes its way to production, your first thought is, “I know exactly how that got there. I should have written tests for that.” 

If your tests are incorrectly written, then you’ll have a false sense of assurance that everything is working as it ought to. When this kind of bug shows up in production, it’s especially frustrating. Your thought is, “We tested for that, and the tests passed! What is going on here?” You find yourself burning cycles trying to hunt down code that’s buggy because your tests are buggy. 

The solution 

Spend more time writing better tests. The process of test writing gives you the headspace to focus on what your application should do. With a comprehensive suite of reliable tests in place, you’ll have fewer in-production bugs to fix, saving you headaches and wasted time. It’s worth putting in the time upfront. 

In additions to writing better tests, Veracode Static Analysis and Dynamic Analysis will also help you avoid security flaws finding their way into production. Static finds bugs in the code itself while dynamic finds bugs at run-time. Using these tools together is the best solution for preventing bugs from getting into production in the first place. 

Bugs in third-party code 

Even worse than trying to fix bugs in your own code is trying to mitigate issues because of bugs in third-party code. These might be small and annoying bugs, or they might be massively impactful security flaws. 

Coming into the end of 2021, software developers were wrapping up their final sprint of the year. Many teams were winding down and getting ready for a break. And then… log4j. Merry. Christmas. 

Teams and developers were scrambling for two weeks in December. They needed to determine if they were vulnerable. If they used log4j directly, they needed to patch their code. If they used any libraries that were vulnerable, they needed to wait for those libraries to issue patched updates. Then the team could patch their project with those updated dependencies. 

How many developers at the time were saying, “How did we get into this mess? Why am I stuck doing this? I’m supposed to be on PTO!” 

Third-party dependencies with known security vulnerabilities should never make it out the front door. If vulnerabilities could be caught before the code makes it out to production, there would be less stress, less uncertainty, and less time wasted frantically trying to patch everything. 

The solution 

Software Composition Analysis (SCA) scans your application codebase to look for usage of third-party, open-source libraries. Veracode SCA cross-references any detected open-source libraries (and the versions used) against the National Vulnerability Database and a separate ML-backed vulnerability database. If dependencies with security flaws are detected, you’re notified. If any of your application dependencies use dependencies of their own (going all the way down the chain), those dependencies are checked by SCA as well. 

By integrating SCA with your CI/CD pipeline, you’ll ensure that all of your third-party dependencies are checked before your application deploys to production. No more scrambling to patch libraries that are already out in the wild. 

2. Dealing with technical debt 

As developers, we often know the right way to do something. But, perhaps because we’re short on time or short on memory, sub-optimal code gets written. We might forget to sanitize inputs or parameterize our queries. Or, we might choose some algorithm for cryptographic hashing because it’s the first one that comes to mind, and there’s no time to research whether that one is strong enough or has been compromised. 

Over time, we build up technical debt. We introduce insecure code, putting off the day when we’ll finally take the time to clean it all up or—and this is worse—when some security vulnerability in our production code comes back to bite us. 

Whenever that day of reckoning comes, you will find yourself asking, “Who wrote this code? Why didn’t we just do it correctly the first time?” 

The solution

Get help from your IDE. 

First, take advantage of linters and code formatters in your IDE to help you keep your code readable. This is for you, but it’s especially for everyone who needs to read your code who isn’t you. Well-formatted code that sticks to common conventions is easier to maintain and debug. 

Next, take advantage of static code analysis that can be integrated with your IDE through plugins. You’ll get helpful feedback on security issues or unsafe coding practices while you code. Immediately, you have access to security recommendations, preempting the introduction of technical debt. 

If you and your team need training on secure coding practices, Veracode Security Labs and the Veracode eLearning platform are excellent resources to help developers level up their application security chops. 

3. Refactoring (ripping) out unsupported or unlicensed libraries 

Eighteen months into building the company’s flagship software product, your team receives a notification email that open-source Package X is reaching end-of-life and will no longer be supported or updated as of next month. Unfortunately, your application depends heavily on this package. 

Refactoring your application to rip out the unsupported library is a non-trivial task. You might need to integrate a different library, or you might need to implement a workaround. It’s a sad reality, but you couldn’t have seen it coming. Not much you can do here. 

Let’s consider another scenario. Your team discovers, after eighteen months of relying on open-source Package X, that the license and attribution terms for Package X don’t allow for its inclusion in proprietary software. That’s right—open source doesn’t always mean you can freely use it for any purpose. Left unaddressed, your application is about to land the company some hefty legal costs. 

Again, you’re forced to refactor, to rip out the usage of this library. However, in this licensing scenario, you should have seen it coming. If someone on your team had done their homework on day one—discovering that you can’t legally use this library—then you never would have adopted and depended upon it. 

As you’re refactoring, you’ll be kicking yourself for all the time you and your team are wasting by fixing a situation that could have been avoided. 

The solution 

In addition to checking for security vulnerabilities in third-party components, Veracode SCA assesses license risk. As SCA scans your application code, it generates a Software Bill of Materials (SBOM), listing all of the dependencies in your application along with a license risk rating. 

Early in your software development lifecycle, when you are just considering the integration of a third-party open-source package, Veracode SCA will alert you to the legality of its usage. By letting SCA help you with your due diligence, you’re setting up your future self for less wasted time. 

Conclusion 

It seems that a common theme across many time-wasting tasks for software developers is the need to fix a flaw that could have been avoided had the right tools been used earlier. Those helpful tools might include: 

  • IDE plugins for linting or static code analysis 

  • Software Composition Analysis (SCA)  

  • CI/CD integrations for static or dynamic analysis of applications before production deployment 

  • Training in application security and secure coding practices 

If you’re looking to recapture wasted time down the road—so that you can focus on the countless important tasks already on your plate—your future self will thank you for integrating some of these tools today. 

You Might Also Like

Introducing OpenAI for Australia

OpenAI to acquire Neptune

Accelerating innovation with AWS: Snyk selected as an AWS Pattern Partner

Security Advisory: Critical RCE Vulnerabilities in React Server Components & Next.js

How confessions can keep language models honest

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Whatsapp Whatsapp LinkedIn Reddit Telegram Email Copy Link Print
Share
Previous Article North Korea’s APT37 Targeting Southern Counterpart with New M2RAT Malware
Next Article Wood and Rammed Earth Nursery / Atelier Régis Roudil Architectes
Leave a comment Leave a comment

Comments (0) Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

235.3k Followers Like
69.1k Followers Follow
11.6k Followers Pin
56.4k Followers Follow
136k Subscribers Subscribe
4.4k Followers Follow
- Advertisement -
Ad imageAd image

Latest News

From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 6 December 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 6 December 2025
Ways to Tell if a Website Is Fake
network vulnerability 6 December 2025
From Prompt Injection To Account Takeover · Embrace The Red
Pentesting 6 December 2025
//

We influence 20 million users and is the number one business and technology news network on the planet

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

Loading
Sécurité Helvétique News | AmyrisSécurité Helvétique News | Amyris
Follow US
© 2023 Sécurité Helvétique NEWS par Amyris Sarl. Tous droits réservés
Amyris news letter
Join Us!

Subscribe to our newsletter and never miss our latest news, podcasts etc..

Loading
Zero spam, Unsubscribe at any time.
login Amyris SH
Welcome Back!

Sign in to your account

Lost your password?