Blog
Agile Requirements Gathering: Practical Advice to Improve Traceability
Looking for traceability during Agile requirements gathering? We outline the differences between Agile and Waterfall requirements gathering techniques and how to add traceability to the process.
Application Lifecycle Management, Security & Compliance, Software Quality
Blog
What is Data Masking?
Data masking is a method of protecting sensitive data by replacing the original value with a fictitious but realistic equivalent. Dive into why it’s important, when it’s needed, and what to look for in a solution in this expert guide by Jatinder Luthra, Pre-sales Engineering Advisor at Perforce Delphix.
Data Management, Security & Compliance
Blog
The AI Maturity Model: Scaling AI from Pilot to Pioneering
What is the AI maturity model, and how do you know where your organization falls on it? Explore the key stages, plus the importance of data security in this blog from Steve Karam, Principal Product Manager for AI, SaaS, and Growth at Perforce Delphix.
AI, Data Management, Security & Compliance
Blog
How to Get Started with DevSecOps 101 for Embedded Software
Embedded software developers can bring security up to speed with modern development by integrating DevSecOps into the software development lifecycle. Get started with DevSecOps 101 with these best practices.
DevOps, Security & Compliance, Coding Best Practices
Blog
The Best Approach to Databricks Data Masking for Enterprise-Scale Compliance
Explore Databricks data masking techniques including column masking, dynamic views, and third-party tools in this blog by Jatinder Luthra, Sales Engineering Advisor at Perforce Delphix. Learn the pros and cons of different approaches and how to choose the best one for your team.
Data Management, Security & Compliance, AI