DEV Community

# devsecops

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Revolutionizing Code Security: How Amazon Q Developer Safeguards Modern Applications

Revolutionizing Code Security: How Amazon Q Developer Safeguards Modern Applications

Comments
7 min read
DevOps vs. DevSecOps: What’s the Difference and Why It Matters?

DevOps vs. DevSecOps: What’s the Difference and Why It Matters?

Comments
5 min read
Ultralytics AI Pwn Request Supply Chain Attack

Ultralytics AI Pwn Request Supply Chain Attack

Comments
7 min read
From SDLC to CI/CD: A Beginner’s Guide

From SDLC to CI/CD: A Beginner’s Guide

Comments
7 min read
Understanding DevSecOps Principles

Understanding DevSecOps Principles

24
Comments
6 min read
How to Build a Cloud Security Policy for Your Organization

How to Build a Cloud Security Policy for Your Organization

Comments
4 min read
From Paper to Code: Why Security is Now a Business Imperative for Developers

From Paper to Code: Why Security is Now a Business Imperative for Developers

4
Comments
3 min read
Ensuring Security and Compliance with a DevSecOps Pipeline

Ensuring Security and Compliance with a DevSecOps Pipeline

Comments
5 min read
Threat Modeling for Non-Security Experts

Threat Modeling for Non-Security Experts

Comments
5 min read
KUBERNETICS

KUBERNETICS

Comments
4 min read
Top 10 Challenges of DevSecOps Implementation in 2024

Top 10 Challenges of DevSecOps Implementation in 2024

Comments
3 min read
Tricentis Tosca: A Powerful Tool for Continuous Testing

Tricentis Tosca: A Powerful Tool for Continuous Testing

1
Comments
3 min read
Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV)

Vulnerability-Free C and C++ Development in Automotive Manufacturing and Software Defined Vehicles (SDV)

Comments
6 min read
Day 02 of learning DevOps: OSI Model

Day 02 of learning DevOps: OSI Model

1
Comments
1 min read
How to Become a DevSecOps from Zero: A Practical Guide

How to Become a DevSecOps from Zero: A Practical Guide

Comments
9 min read
Reimagining cybersecurity for developers

Reimagining cybersecurity for developers

1
Comments
7 min read
7 Kubernetes Security Best Practices in 2024

7 Kubernetes Security Best Practices in 2024

5
Comments
3 min read
Understanding command injection vulnerabilities in Go

Understanding command injection vulnerabilities in Go

11
Comments 1
8 min read
Implementing Blue-Green Deployment in Kubernetes with TLS Encryption Using Cert-Manager and Nginx Ingress

Implementing Blue-Green Deployment in Kubernetes with TLS Encryption Using Cert-Manager and Nginx Ingress

3
Comments
6 min read
Contributing Minder to the OpenSSF, out of a deep belief in the power of the open source community

Contributing Minder to the OpenSSF, out of a deep belief in the power of the open source community

10
Comments
4 min read
Advanced Container Security Techniques for DevSecOps Pipelines

Advanced Container Security Techniques for DevSecOps Pipelines

1
Comments
6 min read
DevSecops Tools in CICD Pipeline

DevSecops Tools in CICD Pipeline

Comments
4 min read
Latest DevOps Tools and Trends: A Comprehensive Guide

Latest DevOps Tools and Trends: A Comprehensive Guide

1
Comments
5 min read
Dive into AI and LLM learning with the new Snyk Learn learning path

Dive into AI and LLM learning with the new Snyk Learn learning path

Comments
2 min read
Demystifying DevOps vs DevSecOps

Demystifying DevOps vs DevSecOps

Comments
3 min read
Clear Link Between DevSecOps and Data Engineering

Clear Link Between DevSecOps and Data Engineering

Comments
1 min read
The Future of DevSecOps: Enhancing Your Software Security Development with NIST Guidelines

The Future of DevSecOps: Enhancing Your Software Security Development with NIST Guidelines

3
Comments
4 min read
The State of DevOps Threats Report – GitProtect.io’s Study Highlights The Major Cyber Risks and Security Best Practices

The State of DevOps Threats Report – GitProtect.io’s Study Highlights The Major Cyber Risks and Security Best Practices

Comments
6 min read
Unleashing the Power of DevOps Transforming Collaboration and Efficiency

Unleashing the Power of DevOps Transforming Collaboration and Efficiency

Comments
2 min read
Introduction to Minder

Introduction to Minder

2
Comments
2 min read
DevSecOps Fundamentals: Security in the Jenkins Pipeline

DevSecOps Fundamentals: Security in the Jenkins Pipeline

4
Comments
5 min read
DevSecOps 2024: The Game-Changing Trends in AI, Automation, and Cloud Tech

DevSecOps 2024: The Game-Changing Trends in AI, Automation, and Cloud Tech

1
Comments
4 min read
Automate Uploading Security Scan Results to DefectDojo

Automate Uploading Security Scan Results to DefectDojo

5
Comments
5 min read
Implement CIS Top 18 Controls in Your Organization

Implement CIS Top 18 Controls in Your Organization

2
Comments
4 min read
Javascript support now in Beta!

Javascript support now in Beta!

Comments
1 min read
The Impact of Security Misconfigurations on Data Breach Incidents

The Impact of Security Misconfigurations on Data Breach Incidents

Comments
5 min read
3 Security Teams To Think About Implementing For Your Organization

3 Security Teams To Think About Implementing For Your Organization

2
Comments
3 min read
DevSecOps en las pipelines de Terraform

DevSecOps en las pipelines de Terraform

Comments
3 min read
Enhancing User Experience With Browser Synthetic Monitoring

Enhancing User Experience With Browser Synthetic Monitoring

1
Comments
4 min read
Comprehensive DevSecOps Pipeline: Secure & Scalable Kubernetes Deployment with AWS EKS, ArgoCD and Jenkins Integration

Comprehensive DevSecOps Pipeline: Secure & Scalable Kubernetes Deployment with AWS EKS, ArgoCD and Jenkins Integration

1
Comments
4 min read
8 Ways AI Can Maximize the Value of Logs

8 Ways AI Can Maximize the Value of Logs

2
Comments
6 min read
Getting Into DevSecOps

Getting Into DevSecOps

Comments
1 min read
Death of DevSecOps, Part 3

Death of DevSecOps, Part 3

Comments
3 min read
Securing Your Data: How to Safely Back Up a Single File on Bitbucket

Securing Your Data: How to Safely Back Up a Single File on Bitbucket

1
Comments
6 min read
Understanding Threat Modeling: 🛡️ Securing Your Digital Assets Effectively

Understanding Threat Modeling: 🛡️ Securing Your Digital Assets Effectively

Comments
2 min read
Integrating Azure Key Vault for Secrets with GitHub Action Workflows - Part 2

Integrating Azure Key Vault for Secrets with GitHub Action Workflows - Part 2

6
Comments
10 min read
Policy as Code with Kyverno

Policy as Code with Kyverno

Comments
3 min read
Best Practices for Using GitHub Secrets - Part 1

Best Practices for Using GitHub Secrets - Part 1

12
Comments
8 min read
SAML SSO In Terms Of GitHub Security

SAML SSO In Terms Of GitHub Security

1
Comments
6 min read
Secret Scanning in CI pipelines using Gitleaks and Pre-commit Hook.

Secret Scanning in CI pipelines using Gitleaks and Pre-commit Hook.

13
Comments
6 min read
DevOps Meets Cybersecurity -> DevSecOps

DevOps Meets Cybersecurity -> DevSecOps

2
Comments
5 min read
Cloud Over-Privileged Accounts: A Recipe for Disaster (and How to Avoid It)

Cloud Over-Privileged Accounts: A Recipe for Disaster (and How to Avoid It)

1
Comments
3 min read
Docker Security Checklist: Are You Production Ready?

Docker Security Checklist: Are You Production Ready?

6
Comments
3 min read
Building a Secure CI/CD Pipeline: Beyond the Basics of Security Testing

Building a Secure CI/CD Pipeline: Beyond the Basics of Security Testing

52
Comments
9 min read
Mastering Version Control with Git: Beyond the Basics

Mastering Version Control with Git: Beyond the Basics

290
Comments 1
10 min read
The Age Of SaaS: How To Protect Your Data

The Age Of SaaS: How To Protect Your Data

Comments
10 min read
Building a Rock-Solid Foundation with Infrastructure as Code (IaC)

Building a Rock-Solid Foundation with Infrastructure as Code (IaC)

19
Comments 1
8 min read
Implement a DevSecOps Pipeline with GitHub Actions

Implement a DevSecOps Pipeline with GitHub Actions

1
Comments 1
5 min read
Building a Fort Knox DevSecOps: Comprehensive Security Practices

Building a Fort Knox DevSecOps: Comprehensive Security Practices

21
Comments
10 min read
Cybersecurity and the State of the Modern Threat Landscape: A Deep Dive on CNAPPs

Cybersecurity and the State of the Modern Threat Landscape: A Deep Dive on CNAPPs

Comments
10 min read
loading...