Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

DEV Community

# devsecops

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Dive into AI and LLM learning with the new Snyk Learn learning path

Dive into AI and LLM learning with the new Snyk Learn learning path

Comments
2 min read
Demystifying DevOps vs DevSecOps

Demystifying DevOps vs DevSecOps

Comments
3 min read
Clear Link Between DevSecOps and Data Engineering

Clear Link Between DevSecOps and Data Engineering

Comments
1 min read
The Future of DevSecOps: Enhancing Your Software Security Development with NIST Guidelines

The Future of DevSecOps: Enhancing Your Software Security Development with NIST Guidelines

3
Comments
4 min read
Implement CIS Top 18 Controls in Your Organization

Implement CIS Top 18 Controls in Your Organization

Comments
4 min read
The State of DevOps Threats Report – GitProtect.io’s Study Highlights The Major Cyber Risks and Security Best Practices

The State of DevOps Threats Report – GitProtect.io’s Study Highlights The Major Cyber Risks and Security Best Practices

Comments
6 min read
Unleashing the Power of DevOps Transforming Collaboration and Efficiency

Unleashing the Power of DevOps Transforming Collaboration and Efficiency

Comments
2 min read
Automate Uploading Security Scan Results to DefectDojo

Automate Uploading Security Scan Results to DefectDojo

Comments
5 min read
Javascript support now in Beta!

Javascript support now in Beta!

Comments
1 min read
The Impact of Security Misconfigurations on Data Breach Incidents

The Impact of Security Misconfigurations on Data Breach Incidents

Comments
5 min read
3 Security Teams To Think About Implementing For Your Organization

3 Security Teams To Think About Implementing For Your Organization

2
Comments
3 min read
DevSecOps en las pipelines de Terraform

DevSecOps en las pipelines de Terraform

Comments
3 min read
Policy as Code with Kyverno

Policy as Code with Kyverno

Comments
3 min read
Enhancing User Experience With Browser Synthetic Monitoring

Enhancing User Experience With Browser Synthetic Monitoring

1
Comments
4 min read
Comprehensive DevSecOps Pipeline: Secure & Scalable Kubernetes Deployment with AWS EKS, ArgoCD and Jenkins Integration

Comprehensive DevSecOps Pipeline: Secure & Scalable Kubernetes Deployment with AWS EKS, ArgoCD and Jenkins Integration

1
Comments
4 min read
8 Ways AI Can Maximize the Value of Logs

8 Ways AI Can Maximize the Value of Logs

2
Comments
6 min read
Getting Into DevSecOps

Getting Into DevSecOps

Comments
1 min read
Death of DevSecOps, Part 3

Death of DevSecOps, Part 3

Comments
3 min read
Securing Your Data: How to Safely Back Up a Single File on Bitbucket

Securing Your Data: How to Safely Back Up a Single File on Bitbucket

1
Comments
6 min read
Understanding Threat Modeling: 🛡️ Securing Your Digital Assets Effectively

Understanding Threat Modeling: 🛡️ Securing Your Digital Assets Effectively

Comments
2 min read
Integrating Azure Key Vault for Secrets with GitHub Action Workflows - Part 2

Integrating Azure Key Vault for Secrets with GitHub Action Workflows - Part 2

6
Comments
10 min read
DevOps Meets Cybersecurity -> DevSecOps

DevOps Meets Cybersecurity -> DevSecOps

3
Comments
5 min read
Best Practices for Using GitHub Secrets - Part 1

Best Practices for Using GitHub Secrets - Part 1

4
Comments
8 min read
SAML SSO In Terms Of GitHub Security

SAML SSO In Terms Of GitHub Security

1
Comments
6 min read
Secret Scanning in CI pipelines using Gitleaks and Pre-commit Hook.

Secret Scanning in CI pipelines using Gitleaks and Pre-commit Hook.

9
Comments
6 min read
Cloud Over-Privileged Accounts: A Recipe for Disaster (and How to Avoid It)

Cloud Over-Privileged Accounts: A Recipe for Disaster (and How to Avoid It)

1
Comments
3 min read
Docker Security Checklist: Are You Production Ready?

Docker Security Checklist: Are You Production Ready?

5
Comments
3 min read
Building a Secure CI/CD Pipeline: Beyond the Basics of Security Testing

Building a Secure CI/CD Pipeline: Beyond the Basics of Security Testing

51
Comments
9 min read
Mastering Version Control with Git: Beyond the Basics

Mastering Version Control with Git: Beyond the Basics

286
Comments 1
10 min read
The Age Of SaaS: How To Protect Your Data

The Age Of SaaS: How To Protect Your Data

Comments
10 min read
Building a Rock-Solid Foundation with Infrastructure as Code (IaC)

Building a Rock-Solid Foundation with Infrastructure as Code (IaC)

19
Comments 1
8 min read
Implement a DevSecOps Pipeline with GitHub Actions

Implement a DevSecOps Pipeline with GitHub Actions

1
Comments 1
5 min read
Building a Fort Knox DevSecOps: Comprehensive Security Practices

Building a Fort Knox DevSecOps: Comprehensive Security Practices

21
Comments
10 min read
Cybersecurity and the State of the Modern Threat Landscape: A Deep Dive on CNAPPs

Cybersecurity and the State of the Modern Threat Landscape: A Deep Dive on CNAPPs

Comments
10 min read
What is HashiCorp Vault?

What is HashiCorp Vault?

Comments
3 min read
Zero Trust Security: Beyond the Castle Walls

Zero Trust Security: Beyond the Castle Walls

12
Comments
11 min read
What is DevSecOps? A Comprehensive Look at DevSecOps

What is DevSecOps? A Comprehensive Look at DevSecOps

97
Comments 4
12 min read
Call for action: Exploring vulnerabilities in Github Actions

Call for action: Exploring vulnerabilities in Github Actions

1
Comments
16 min read
Cloud-Native Security: A Guide to Microservices and Serverless Protection

Cloud-Native Security: A Guide to Microservices and Serverless Protection

16
Comments 1
11 min read
Death of DevSecOps, Part 2

Death of DevSecOps, Part 2

2
Comments
4 min read
Pipeline Integrity and Security in DevSecOps

Pipeline Integrity and Security in DevSecOps

Comments
11 min read
Network Policy in Kubernetes

Network Policy in Kubernetes

8
Comments 1
2 min read
Advanced CI/CD Pipeline Configuration Strategies

Advanced CI/CD Pipeline Configuration Strategies

136
Comments 13
9 min read
Secure-by-Design Software in DevSecOps

Secure-by-Design Software in DevSecOps

1
Comments
13 min read
DevSecOps Made Easy (Pt 2) - Stay clear of any lock-in

DevSecOps Made Easy (Pt 2) - Stay clear of any lock-in

1
Comments
2 min read
Measuring and Enhancing DevSecOps Posture: Key Metrics

Measuring and Enhancing DevSecOps Posture: Key Metrics

Comments
4 min read
How You Can Use Logs to Feed Security

How You Can Use Logs to Feed Security

Comments
6 min read
Set up FreeIPA Server & Client.

Set up FreeIPA Server & Client.

2
Comments
4 min read
DevSecOps: It’s Time To Pay For Your Demand – Not Ingestion

DevSecOps: It’s Time To Pay For Your Demand – Not Ingestion

1
Comments
5 min read
From Theory to Practice: Unlocking DevSecOps Excellence with Proven Best Practices

From Theory to Practice: Unlocking DevSecOps Excellence with Proven Best Practices

Comments
4 min read
Deploying a Bulletproof Photo Sharing App with DevSecOps Terraform, AWS, EKS and Chaos Engineering

Deploying a Bulletproof Photo Sharing App with DevSecOps Terraform, AWS, EKS and Chaos Engineering

9
Comments 2
6 min read
Vulnerability Management Lifecycle in DevSecOps

Vulnerability Management Lifecycle in DevSecOps

3
Comments
11 min read
GenAI-Powered Digital Threads - AI Security Under the Hood, Part II

GenAI-Powered Digital Threads - AI Security Under the Hood, Part II

1
Comments
5 min read
Cloud Security and Resilience: DevSecOps Tools and Practices

Cloud Security and Resilience: DevSecOps Tools and Practices

7
Comments 1
2 min read
Kickstarting Your DevSecOps Career - The 4 Essential Certifications You Need

Kickstarting Your DevSecOps Career - The 4 Essential Certifications You Need

6
Comments
5 min read
Responsibilities of a modern CISO

Responsibilities of a modern CISO

2
Comments
6 min read
Secure SDLC (Part 1): issues, approach, tech metrics, team’s KPI

Secure SDLC (Part 1): issues, approach, tech metrics, team’s KPI

1
Comments
6 min read
Exploring the World of SAST and DAST with a DevSecOps Twist

Exploring the World of SAST and DAST with a DevSecOps Twist

3
Comments
4 min read
CloudBees Security Insights Overview

CloudBees Security Insights Overview

2
Comments
8 min read
Deploying a Bulletproof Photo Sharing App with DevSecOps Terraform, AWS, EKS and Chaos Engineering

Deploying a Bulletproof Photo Sharing App with DevSecOps Terraform, AWS, EKS and Chaos Engineering

1
Comments 2
6 min read
loading...