DEV Community

# devsecops

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Deploying a Bulletproof Photo Sharing App with DevSecOps Terraform, AWS, EKS and Chaos Engineering

Deploying a Bulletproof Photo Sharing App with DevSecOps Terraform, AWS, EKS and Chaos Engineering

10
Comments 2
6 min read
Vulnerability Management Lifecycle in DevSecOps

Vulnerability Management Lifecycle in DevSecOps

3
Comments
11 min read
GenAI-Powered Digital Threads - AI Security Under the Hood, Part II

GenAI-Powered Digital Threads - AI Security Under the Hood, Part II

1
Comments
5 min read
Cloud Security and Resilience: DevSecOps Tools and Practices

Cloud Security and Resilience: DevSecOps Tools and Practices

7
Comments 1
2 min read
Kickstarting Your DevSecOps Career - The 4 Essential Certifications You Need

Kickstarting Your DevSecOps Career - The 4 Essential Certifications You Need

6
Comments
5 min read
Responsibilities of a modern CISO

Responsibilities of a modern CISO

2
Comments
6 min read
Secure SDLC (Part 1): issues, approach, tech metrics, team’s KPI

Secure SDLC (Part 1): issues, approach, tech metrics, team’s KPI

1
Comments
6 min read
Exploring the World of SAST and DAST with a DevSecOps Twist

Exploring the World of SAST and DAST with a DevSecOps Twist

3
Comments
4 min read
CloudBees Security Insights Overview

CloudBees Security Insights Overview

2
Comments
8 min read
Deploying a Bulletproof Photo Sharing App with DevSecOps Terraform, AWS, EKS and Chaos Engineering

Deploying a Bulletproof Photo Sharing App with DevSecOps Terraform, AWS, EKS and Chaos Engineering

1
Comments 2
6 min read
From Theory to Practice: Unlocking DevSecOps Excellence with Proven Best Practices

From Theory to Practice: Unlocking DevSecOps Excellence with Proven Best Practices

Comments
4 min read
A deep dive into zero-day vulnerability alerts with New Relic APM

A deep dive into zero-day vulnerability alerts with New Relic APM

1
Comments
7 min read
DevSecOps with AWS- IaC at scale - Building your own platform - Part 1

DevSecOps with AWS- IaC at scale - Building your own platform - Part 1

7
Comments
6 min read
Atlassian security incidents: 2023 in Review

Atlassian security incidents: 2023 in Review

Comments
8 min read
Creating a DevSecOps pipeline with Jenkins — Part 1

Creating a DevSecOps pipeline with Jenkins — Part 1

1
Comments
12 min read
Level-Up Your AWS CDK Game: Shift Left Security Unveiled!

Level-Up Your AWS CDK Game: Shift Left Security Unveiled!

7
Comments 4
12 min read
The Role of CNAPP in Modern DevSecOps

The Role of CNAPP in Modern DevSecOps

Comments
5 min read
Amazon Security Lake: Centralized Data Management for Modern DevSecOps Toolchains

Amazon Security Lake: Centralized Data Management for Modern DevSecOps Toolchains

1
Comments
8 min read
DevSecOps: Learn To Develop In A Safer Way

DevSecOps: Learn To Develop In A Safer Way

Comments
5 min read
Code Security

Code Security

Comments
2 min read
Let's Play Snyk 🐶

Let's Play Snyk 🐶

2
Comments 4
5 min read
A Deep Dive into OCSF & VEX - Unified Standards for Security Management

A Deep Dive into OCSF & VEX - Unified Standards for Security Management

6
Comments
6 min read
OWASP API10:2023 Unsafe Consumption of APIs

OWASP API10:2023 Unsafe Consumption of APIs

5
Comments
3 min read
OWASP API9:2023 Improper Inventory Management 📊🛠️🚨

OWASP API9:2023 Improper Inventory Management 📊🛠️🚨

8
Comments
3 min read
The Future of DevSecOps with the CloudBees Platform—An In-Depth Look

The Future of DevSecOps with the CloudBees Platform—An In-Depth Look

16
Comments
4 min read
Designing Security Workflows using Gitlab CI Templates

Designing Security Workflows using Gitlab CI Templates

3
Comments
5 min read
DevSecOps MythBuster – “Git Clone and DevOps Backup Script is all I need for data protection”

DevSecOps MythBuster – “Git Clone and DevOps Backup Script is all I need for data protection”

Comments
4 min read
OWASP API8:2023 Security Misconfiguration 🔐🚨

OWASP API8:2023 Security Misconfiguration 🔐🚨

5
Comments
3 min read
OWASP API7:2023 Server Side Request Forgery(SSRF)

OWASP API7:2023 Server Side Request Forgery(SSRF)

7
Comments
3 min read
OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

3
Comments
3 min read
OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

7
Comments
4 min read
Automating Dockerfile Vulnerability Scanning in GitHub Actions Using Snyk and CodeQL

Automating Dockerfile Vulnerability Scanning in GitHub Actions Using Snyk and CodeQL

1
Comments
3 min read
Integrating Cybersecurity into AI Software Development on Kubernetes: Key Takeaways from Andrew Martin

Integrating Cybersecurity into AI Software Development on Kubernetes: Key Takeaways from Andrew Martin

2
Comments
3 min read
OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

4
Comments
4 min read
OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

5
Comments
5 min read
OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

5
Comments
5 min read
Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

7
Comments 3
4 min read
GitHub Shared Responsibility Model and Source Code Protection

GitHub Shared Responsibility Model and Source Code Protection

Comments
7 min read
Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

6
Comments
4 min read
DevSecOps: Orchestrating Secure and Observable 3-Tier Deployments on AWS with Terraform, EKS, Jenkins, Prometheus etc.

DevSecOps: Orchestrating Secure and Observable 3-Tier Deployments on AWS with Terraform, EKS, Jenkins, Prometheus etc.

5
Comments
19 min read
10 GitHub Security Best Practices

10 GitHub Security Best Practices

3
Comments
14 min read
Getting Started with DevSecOps: An Introduction to CNAPP

Getting Started with DevSecOps: An Introduction to CNAPP

4
Comments
6 min read
A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

3
Comments
2 min read
The New Frontier in Cybersecurity: Embracing Security as Code

The New Frontier in Cybersecurity: Embracing Security as Code

Comments
11 min read
Kubernetes Container Policies: Enhancing Security and Efficiency

Kubernetes Container Policies: Enhancing Security and Efficiency

Comments
6 min read
DevSecOps MythBuster : “Nothing fails in the cloud / SaaS…”

DevSecOps MythBuster : “Nothing fails in the cloud / SaaS…”

Comments
8 min read
Dominando las pruebas en DevOps: Una guía exhaustiva de tipos y técnicas

Dominando las pruebas en DevOps: Una guía exhaustiva de tipos y técnicas

1
Comments
3 min read
How to Secure Your Secrets Manager with GitGuardian Honeytoken

How to Secure Your Secrets Manager with GitGuardian Honeytoken

Comments
5 min read
Best Practices for DevSecOps Implementation:

Best Practices for DevSecOps Implementation:

1
Comments
2 min read
What’s the Deal with CVEs?

What’s the Deal with CVEs?

1
Comments
6 min read
DevSecOps Integration for MSPs: Elevating Client Security, Market Distinction, and Profitability

DevSecOps Integration for MSPs: Elevating Client Security, Market Distinction, and Profitability

1
Comments
4 min read
Common SAML vulnerabilities and how to remediate them

Common SAML vulnerabilities and how to remediate them

2
Comments 1
4 min read
An introduction to IAM Roles

An introduction to IAM Roles

Comments
5 min read
Shifting Left Approach: Is It A Business Challenge?

Shifting Left Approach: Is It A Business Challenge?

Comments
9 min read
DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 2

DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 2

3
Comments
7 min read
Kubernetes 1.29: The Security Perspective

Kubernetes 1.29: The Security Perspective

Comments
1 min read
Kubernetes 1.29: The Security Perspective

Kubernetes 1.29: The Security Perspective

Comments
1 min read
Securing Your Applications on AWS: Guide to Data Privacy and Protection

Securing Your Applications on AWS: Guide to Data Privacy and Protection

3
Comments
3 min read
DevOps vs DevSecOps

DevOps vs DevSecOps

2
Comments 2
2 min read
What to do if you expose a secret: How to stay calm and respond to an incident

What to do if you expose a secret: How to stay calm and respond to an incident

1
Comments
12 min read
loading...