{"id":48647,"date":"2022-09-29T16:10:34","date_gmt":"2022-09-29T16:10:34","guid":{"rendered":"http:\/\/7ec2be30-ff11-4da0-a2c1-977a0798f0be"},"modified":"2022-09-29T16:10:34","modified_gmt":"2022-09-29T16:10:34","slug":"want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/","title":{"rendered":"Want to dodge a data breach? Do DevOps and let developers work from home, says Google"},"content":{"rendered":"<figure class=\"c-shortcodeImage u-clearfix c-shortcodeImage-large\">\n<div class=\"c-shortcodeImage_imageContainer\">\n<div class=\"c-shortcodeImage_image\"><picture class=\"c-cmsImage c-cmsImage_loaded\"><source media=\"(max-width: 767px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/023912b30c2fed41690860978453771e3d14b4c4\/2022\/01\/14\/0b24e75d-ebff-4dc7-87b0-cd98a13ee82e\/zd-g-devops.jpg?auto=webp&amp;width=768\" alt=\"zd-g-devops.jpg\"><source media=\"(max-width: 1023px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/f6d591b60cdbf4b9310b87c2a9701a48665e012f\/2022\/01\/14\/0b24e75d-ebff-4dc7-87b0-cd98a13ee82e\/zd-g-devops.jpg?auto=webp&amp;width=1024\" alt=\"zd-g-devops.jpg\"><source media=\"(max-width: 1440px)\" srcset=\"https:\/\/www.zdnet.com\/a\/img\/resize\/6080d61c330dd1c668a63cd1b97d9230179e9684\/2022\/01\/14\/0b24e75d-ebff-4dc7-87b0-cd98a13ee82e\/zd-g-devops.jpg?auto=webp&amp;width=1200\" alt=\"zd-g-devops.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.zdnet.com\/a\/img\/resize\/6080d61c330dd1c668a63cd1b97d9230179e9684\/2022\/01\/14\/0b24e75d-ebff-4dc7-87b0-cd98a13ee82e\/zd-g-devops.jpg?auto=webp&amp;width=1200\" alt=\"zd-g-devops.jpg\" height=\"800\" width=\"1200\" fetchpriority=\"low\"><\/picture><\/div>\n<p> <!----><\/div>\n<p> <!----> <!----><\/figure>\n<p>DevOps, which brings faster software updates, could help prevent the avalanche of records exposed in data breaches, but Google&#8217;s research finds that existing practices don&#8217;t meet the task at hand.&nbsp; &nbsp;<\/p>\n<p>Google surveyed 33,000 tech pros to explore how DevOps &#8212; which broadly means aligning software development with IT operations &#8212; impacts cybersecurity as part of its annual <a href=\"https:\/\/cloud.google.com\/blog\/products\/devops-sre\/dora-2022-accelerate-state-of-devops-report-now-out\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Accelerate State of DevOps Report<\/a>. As it notes, more than <a href=\"https:\/\/flashpoint.io\/blog\/shifts-in-the-data-breach-landscape-and-cyber-insurance\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">22 billion records<\/a> were exposed in 2021 through 4,145 publicly known breaches.<\/p>\n<p>The report comes as Australian telco Optus <a href=\"https:\/\/www.zdnet.com\/article\/australia-government-wants-optus-to-pay-for-data-breach\/\" rel=\"follow\">handles the fallout from a massive breach<\/a> that exposed nearly 10 million residents&#8217; personally identifiable information (PII) after a hacker on the internet waltzed through an <a href=\"https:\/\/twitter.com\/Jeremy_Kirk\/status\/1573652991496048640\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">application programming interface (API) on an cloud-hosted endpoint that didn&#8217;t require a password to access<\/a>.&nbsp;<\/p>\n<p>Google&#8217;s survey focussed on software supply chain security &#8212; an area of security that got much closer attention after t<a href=\"https:\/\/www.zdnet.com\/article\/microsoft-solarwinds-attack-took-more-than-1000-engineers-to-create\/\" rel=\"follow\">he SolarWinds attack<\/a> in 2020 and the open-source&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/log4shell-exploited-to-infect-vmware-horizon-servers-with-backdoors-crypto-miners\/\" rel=\"follow\">Log4Shell flaw this year<\/a>. These two cases changed the way the tech industry <a href=\"https:\/\/www.zdnet.com\/article\/solarwinds-heres-how-were-building-everything-around-this-new-cybersecurity-strategy\/\" rel=\"follow\">manages software development processes<\/a> and uses components, such as <a href=\"https:\/\/www.zdnet.com\/article\/hundreds-more-malicious-packages-found-in-npm-factory\/\" rel=\"follow\">libraries and language packages<\/a> within&nbsp;<a href=\"https:\/\/www.zdnet.com\/article\/log4j-flaw-why-it-will-still-be-causing-problems-a-decade-from-now\/\" rel=\"follow\">other products and services<\/a>.&nbsp; &nbsp;<\/p>\n<p>DevOps aims to accelerate software releases while <a href=\"https:\/\/www.zdnet.com\/article\/as-devops-adoption-rises-software-releases-hit-daily-stride\/\" rel=\"follow\">maintaining quality and increasingly focuses on security updates<\/a>. But how much has changed since the SolarWinds breach and Log4Shell?<\/p>\n<p>To estimate this, Google used its take on the <a href=\"https:\/\/www.zdnet.com\/article\/linux-and-open-source-communities-rise-to-bidens-cybersecurity-challenge\/\" rel=\"follow\">Software Bill of Materials (SBOM)<\/a> concept, which the White House instructed US federal agencies to implement in 2021, called <a href=\"https:\/\/slsa.dev\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Supply-chain Levels for Secure Artifacts<\/a> (SLSA).<\/p>\n<p>One of Google&#8217;s key ideas is that, for major open-source projects, <a href=\"https:\/\/www.zdnet.com\/article\/open-source-security-google-has-a-new-plan-to-stop-software-supply-chain-attacks\/\" rel=\"follow\">two developers should cryptographically sign changes<\/a> made to source code. This practice would have stopped state-sponsored attackers from compromising SolarWinds&#8217; software build system by installing an implant that injected a backdoor during each new build. Google also used the NIST&#8217;s <a href=\"https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-218\/final\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">Secure Software Development Framework<\/a> (SSDF) as a baseline in the survey.&nbsp;<\/p>\n<p>Google found that 63% of respondents used application-level security scanning as part of continuous integration\/continuous delivery (CI\/CD) systems for production releases. It also found that most developers were preserving code history and using build scripts.<\/p>\n<p>That&#8217;s a reassuring trend, although less than 50% were practicing two-person reviews of code changes and only 43% were signing metadata.<\/p>\n<p>&#8220;Software supply chain security practices embodied in SLSA and SSDF already see modest adoption, but there is ample room for more,&#8221; <a href=\"https:\/\/services.google.com\/fh\/files\/misc\/2022_state_of_devops_report.pdf\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">the report concludes<\/a>.<\/p>\n<p>Keeping staff happy can change security outcomes, too. Google found that employers who gave staff the option of hybrid working performed better and suffered lower burnout.<\/p>\n<p>&#8220;Findings showed that organizations with higher levels of employee flexibility have higher organizational performance compared to organizations with more rigid work arrangements. These findings provide evidence that giving employees the freedom to modify their work arrangements as needed has tangible and direct benefits for an organization,&#8221; Google notes.&nbsp; &nbsp;<\/p>\n<p>Google waded into murky territory of asking respondents to forecast how work styles affected future bugs by asking them to predict the likelihood that a security breach or a complete outage would occur over the next 12 months.&nbsp;<\/p>\n<p>People working at &#8220;high performing organizations were less likely to expect a major error to occur,&#8221; Google said.<\/p>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Developers are tracking what components are used in software, but most of them don&#8217;t sign-off on code changes, suggesting a long road ahead for protecting the software supply chain.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-48647","post","type-post","status-publish","format-standard","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Want to dodge a data breach? Do DevOps and let developers work from home, says Google 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Want to dodge a data breach? Do DevOps and let developers work from home, says Google 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-29T16:10:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.zdnet.com\/a\/img\/resize\/6080d61c330dd1c668a63cd1b97d9230179e9684\/2022\/01\/14\/0b24e75d-ebff-4dc7-87b0-cd98a13ee82e\/zd-g-devops.jpg?auto=webp&amp;width=1200\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Want to dodge a data breach? Do DevOps and let developers work from home, says Google\",\"datePublished\":\"2022-09-29T16:10:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\\\/\"},\"wordCount\":547,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/6080d61c330dd1c668a63cd1b97d9230179e9684\\\/2022\\\/01\\\/14\\\/0b24e75d-ebff-4dc7-87b0-cd98a13ee82e\\\/zd-g-devops.jpg?auto=webp&amp;width=1200\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\\\/\",\"name\":\"Want to dodge a data breach? Do DevOps and let developers work from home, says Google 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/6080d61c330dd1c668a63cd1b97d9230179e9684\\\/2022\\\/01\\\/14\\\/0b24e75d-ebff-4dc7-87b0-cd98a13ee82e\\\/zd-g-devops.jpg?auto=webp&amp;width=1200\",\"datePublished\":\"2022-09-29T16:10:34+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/6080d61c330dd1c668a63cd1b97d9230179e9684\\\/2022\\\/01\\\/14\\\/0b24e75d-ebff-4dc7-87b0-cd98a13ee82e\\\/zd-g-devops.jpg?auto=webp&amp;width=1200\",\"contentUrl\":\"https:\\\/\\\/www.zdnet.com\\\/a\\\/img\\\/resize\\\/6080d61c330dd1c668a63cd1b97d9230179e9684\\\/2022\\\/01\\\/14\\\/0b24e75d-ebff-4dc7-87b0-cd98a13ee82e\\\/zd-g-devops.jpg?auto=webp&amp;width=1200\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Want to dodge a data breach? Do DevOps and let developers work from home, says Google\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Want to dodge a data breach? Do DevOps and let developers work from home, says Google 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/","og_locale":"en_US","og_type":"article","og_title":"Want to dodge a data breach? Do DevOps and let developers work from home, says Google 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2022-09-29T16:10:34+00:00","og_image":[{"url":"https:\/\/www.zdnet.com\/a\/img\/resize\/6080d61c330dd1c668a63cd1b97d9230179e9684\/2022\/01\/14\/0b24e75d-ebff-4dc7-87b0-cd98a13ee82e\/zd-g-devops.jpg?auto=webp&amp;width=1200","type":"","width":"","height":""}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Want to dodge a data breach? Do DevOps and let developers work from home, says Google","datePublished":"2022-09-29T16:10:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/"},"wordCount":547,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/6080d61c330dd1c668a63cd1b97d9230179e9684\/2022\/01\/14\/0b24e75d-ebff-4dc7-87b0-cd98a13ee82e\/zd-g-devops.jpg?auto=webp&amp;width=1200","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/","url":"https:\/\/www.threatshub.org\/blog\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/","name":"Want to dodge a data breach? Do DevOps and let developers work from home, says Google 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/#primaryimage"},"thumbnailUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/6080d61c330dd1c668a63cd1b97d9230179e9684\/2022\/01\/14\/0b24e75d-ebff-4dc7-87b0-cd98a13ee82e\/zd-g-devops.jpg?auto=webp&amp;width=1200","datePublished":"2022-09-29T16:10:34+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/#primaryimage","url":"https:\/\/www.zdnet.com\/a\/img\/resize\/6080d61c330dd1c668a63cd1b97d9230179e9684\/2022\/01\/14\/0b24e75d-ebff-4dc7-87b0-cd98a13ee82e\/zd-g-devops.jpg?auto=webp&amp;width=1200","contentUrl":"https:\/\/www.zdnet.com\/a\/img\/resize\/6080d61c330dd1c668a63cd1b97d9230179e9684\/2022\/01\/14\/0b24e75d-ebff-4dc7-87b0-cd98a13ee82e\/zd-g-devops.jpg?auto=webp&amp;width=1200"},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/want-to-dodge-a-data-breach-do-devops-and-let-developers-work-from-home-says-google\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Want to dodge a data breach? Do DevOps and let developers work from home, says Google"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48647","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=48647"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/48647\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=48647"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=48647"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=48647"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}