DEV Community

# devsecops

Integrating security practices into the DevOps lifecycle.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Why Software Design Patterns Matter for Cybersecurity

Why Software Design Patterns Matter for Cybersecurity

1
Comments
4 min read
DevOps Threats Unwrapped: Mid-Year Report 2025

DevOps Threats Unwrapped: Mid-Year Report 2025

Comments
8 min read
The Power of Scheduled Automated Backups for DevOps and SaaS

The Power of Scheduled Automated Backups for DevOps and SaaS

Comments
8 min read
Crafting the Perfect Golden AMI for Auto Scaling Groups in AWS

Crafting the Perfect Golden AMI for Auto Scaling Groups in AWS

Comments
3 min read
🔍 Applying Flawfinder: A Lightweight SAST Tool to Secure C/C++ Codebases

🔍 Applying Flawfinder: A Lightweight SAST Tool to Secure C/C++ Codebases

2
Comments
4 min read
Taming the Hydra: Why Your Kubernetes Secrets Management is Broken (And How CyberArk Conjur Fixes It)

Taming the Hydra: Why Your Kubernetes Secrets Management is Broken (And How CyberArk Conjur Fixes It)

Comments
4 min read
Speaking Different Languages: How to Align Dev and Sec Teams Effectively

Speaking Different Languages: How to Align Dev and Sec Teams Effectively

Comments
5 min read
Applying Bandit SAST Tool to Secure Python Applications

Applying Bandit SAST Tool to Secure Python Applications

2
Comments 1
3 min read
Troubleshooting Common DevOps Challenges

Troubleshooting Common DevOps Challenges

35
Comments
3 min read
Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Comments
1 min read
How to Setup a LAMP Server at Home Using AWS (Step-by-Step Guide)

How to Setup a LAMP Server at Home Using AWS (Step-by-Step Guide)

6
Comments 2
3 min read
Shift Left Security Practices Developers Like

Shift Left Security Practices Developers Like

1
Comments
8 min read
Git and Practical Tips for Security: Actionable Practices, Workflows, and Platform-Specific Guidance

Git and Practical Tips for Security: Actionable Practices, Workflows, and Platform-Specific Guidance

1
Comments
12 min read
Authentication vs. Authorization

Authentication vs. Authorization

Comments
1 min read
Global Product Security Strategy: A Multi-Layered Framework (I.P. developed)

Global Product Security Strategy: A Multi-Layered Framework (I.P. developed)

1
Comments
4 min read
Secure at Inception: Introducing New Tools for Securing AI-Native Development

Secure at Inception: Introducing New Tools for Securing AI-Native Development

Comments
7 min read
🚀 Pulumi AWS Provider 7.0: Multi-Region AWS IaC & IAM Role Chaining

🚀 Pulumi AWS Provider 7.0: Multi-Region AWS IaC & IAM Role Chaining

4
Comments
1 min read
Falco With Kubernetes

Falco With Kubernetes

2
Comments
2 min read
Dev Diary #2: Cloud Security plugin for JetBrains IDE

Dev Diary #2: Cloud Security plugin for JetBrains IDE

Comments
3 min read
Istio - Service Mesh

Istio - Service Mesh

1
Comments
5 min read
Building your own SBOM Engine for .NET & Node.js

Building your own SBOM Engine for .NET & Node.js

1
Comments
1 min read
Vault With Kubernetes 🔐

Vault With Kubernetes 🔐

1
Comments
9 min read
🧠 AI Malware Mutants: The Cybersecurity Crisis of 2025

🧠 AI Malware Mutants: The Cybersecurity Crisis of 2025

Comments
3 min read
Breaking into Appsec/Devsecops without being a developer: Complete roadmap

Breaking into Appsec/Devsecops without being a developer: Complete roadmap

1
Comments
3 min read
From DevOps to DevSecOps: How Secure Software Development Evolved

From DevOps to DevSecOps: How Secure Software Development Evolved

Comments
5 min read
loading...