DEV Community

# devsecops

Integrating security practices into the DevOps lifecycle.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Use AI to Speed Up Security Hardening (and Read This First)

Use AI to Speed Up Security Hardening (and Read This First)

Comments
1 min read
Pin It or Bin It

Pin It or Bin It

Comments
3 min read
🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

1
Comments 1
1 min read
From APK to Source Code: The Dark Art of App Decompiling (2025 Edition)

From APK to Source Code: The Dark Art of App Decompiling (2025 Edition)

Comments
1 min read
How DevSecOps Redefines QA Workflows

How DevSecOps Redefines QA Workflows

5
Comments
5 min read
DevSecOps: Modelo de madurez y alternativas de implementación

DevSecOps: Modelo de madurez y alternativas de implementación

5
Comments
10 min read
PCI DSS 4.0 Remediation 2025: 21 Battle-Tested Fixes

PCI DSS 4.0 Remediation 2025: 21 Battle-Tested Fixes

2
Comments
6 min read
EU CRA: 12-Month Dev Roadmap for SBOM & Vulnerabilities (DEV-oriented)

EU CRA: 12-Month Dev Roadmap for SBOM & Vulnerabilities (DEV-oriented)

2
Comments
7 min read
Fast Code, Fragile Security: How DevSecOps Lost Control (and How We Fix It)

Fast Code, Fragile Security: How DevSecOps Lost Control (and How We Fix It)

Comments 1
29 min read
EnvSecOps - What It Actually Is (And Why DevSecOps Won't Cut It)

EnvSecOps - What It Actually Is (And Why DevSecOps Won't Cut It)

Comments
3 min read
Why Software Design Patterns Matter for Cybersecurity

Why Software Design Patterns Matter for Cybersecurity

1
Comments
4 min read
DevOps Threats Unwrapped: Mid-Year Report 2025

DevOps Threats Unwrapped: Mid-Year Report 2025

Comments
8 min read
Crafting the Perfect Golden AMI for Auto Scaling Groups in AWS

Crafting the Perfect Golden AMI for Auto Scaling Groups in AWS

Comments
3 min read
Taming the Hydra: Why Your Kubernetes Secrets Management is Broken (And How CyberArk Conjur Fixes It)

Taming the Hydra: Why Your Kubernetes Secrets Management is Broken (And How CyberArk Conjur Fixes It)

Comments
4 min read
DevSecOps Pipeline | Jenkins, Terraform, Docker, Trivy, AWS

DevSecOps Pipeline | Jenkins, Terraform, Docker, Trivy, AWS

Comments
8 min read
Forget Everything You Knew About DevOps: The New Rules for 2025 |Are You Still Just "Doing DevOps"? It's Time to Evolve.

Forget Everything You Knew About DevOps: The New Rules for 2025 |Are You Still Just "Doing DevOps"? It's Time to Evolve.

1
Comments
3 min read
OpenStack for DevOps Beginners: Hands-On with MicroStack

OpenStack for DevOps Beginners: Hands-On with MicroStack

Comments
3 min read
The Power of Scheduled Automated Backups for DevOps and SaaS

The Power of Scheduled Automated Backups for DevOps and SaaS

Comments
8 min read
Applying Bandit SAST Tool to Secure Python Applications

Applying Bandit SAST Tool to Secure Python Applications

1
Comments 1
3 min read
🔍 Applying Flawfinder: A Lightweight SAST Tool to Secure C/C++ Codebases

🔍 Applying Flawfinder: A Lightweight SAST Tool to Secure C/C++ Codebases

1
Comments
4 min read
Troubleshooting Common DevOps Challenges

Troubleshooting Common DevOps Challenges

55
Comments
3 min read
Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Comments
1 min read
Shift Left Security Practices Developers Like

Shift Left Security Practices Developers Like

Comments
8 min read
Git and Practical Tips for Security: Actionable Practices, Workflows, and Platform-Specific Guidance

Git and Practical Tips for Security: Actionable Practices, Workflows, and Platform-Specific Guidance

1
Comments
12 min read
Speaking Different Languages: How to Align Dev and Sec Teams Effectively

Speaking Different Languages: How to Align Dev and Sec Teams Effectively

Comments
5 min read
loading...