DEV Community

# devsecops

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
10 GitHub Security Best Practices

10 GitHub Security Best Practices

3
Comments
14 min read
Getting Started with DevSecOps: An Introduction to CNAPP

Getting Started with DevSecOps: An Introduction to CNAPP

4
Comments
6 min read
A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

3
Comments
2 min read
The New Frontier in Cybersecurity: Embracing Security as Code

The New Frontier in Cybersecurity: Embracing Security as Code

Comments
11 min read
Kubernetes Container Policies: Enhancing Security and Efficiency

Kubernetes Container Policies: Enhancing Security and Efficiency

Comments
6 min read
DevSecOps MythBuster : “Nothing fails in the cloud / SaaS…”

DevSecOps MythBuster : “Nothing fails in the cloud / SaaS…”

Comments
8 min read
Dominando las pruebas en DevOps: Una guía exhaustiva de tipos y técnicas

Dominando las pruebas en DevOps: Una guía exhaustiva de tipos y técnicas

1
Comments
3 min read
How to Secure Your Secrets Manager with GitGuardian Honeytoken

How to Secure Your Secrets Manager with GitGuardian Honeytoken

Comments
5 min read
Best Practices for DevSecOps Implementation:

Best Practices for DevSecOps Implementation:

1
Comments
2 min read
What’s the Deal with CVEs?

What’s the Deal with CVEs?

1
Comments
6 min read
DevSecOps Integration for MSPs: Elevating Client Security, Market Distinction, and Profitability

DevSecOps Integration for MSPs: Elevating Client Security, Market Distinction, and Profitability

1
Comments
4 min read
Common SAML vulnerabilities and how to remediate them

Common SAML vulnerabilities and how to remediate them

2
Comments 1
4 min read
An introduction to IAM Roles

An introduction to IAM Roles

Comments
5 min read
Shifting Left Approach: Is It A Business Challenge?

Shifting Left Approach: Is It A Business Challenge?

Comments
9 min read
DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 2

DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 2

3
Comments
7 min read
Kubernetes 1.29: The Security Perspective

Kubernetes 1.29: The Security Perspective

Comments
1 min read
Kubernetes 1.29: The Security Perspective

Kubernetes 1.29: The Security Perspective

Comments
1 min read
Securing Your Applications on AWS: Guide to Data Privacy and Protection

Securing Your Applications on AWS: Guide to Data Privacy and Protection

2
Comments
3 min read
DevOps vs DevSecOps

DevOps vs DevSecOps

2
Comments 2
2 min read
What to do if you expose a secret: How to stay calm and respond to an incident

What to do if you expose a secret: How to stay calm and respond to an incident

1
Comments
12 min read
Mastering Reliability in High-Velocity Software Development

Mastering Reliability in High-Velocity Software Development

Comments
9 min read
Introducing to Jira Security: Best Practices For Protecting Your Data

Introducing to Jira Security: Best Practices For Protecting Your Data

Comments
9 min read
DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 1

DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 1

32
Comments 1
6 min read
How to update cURL

How to update cURL

7
Comments
8 min read
Azure DevOps Pipeline: no secrets, no certificates

Azure DevOps Pipeline: no secrets, no certificates

6
Comments 4
5 min read
Handling Secrets with AWS Secrets Manager

Handling Secrets with AWS Secrets Manager

Comments
13 min read
GitHub Recovery Code

GitHub Recovery Code

1
Comments
4 min read
Securing Your Code with GitHub

Securing Your Code with GitHub

40
Comments 1
7 min read
Fixing Python Security Flaws with Bandit

Fixing Python Security Flaws with Bandit

Comments
3 min read
GitHub RepoJacking: Are You Sure Your GitHub Is Safe?

GitHub RepoJacking: Are You Sure Your GitHub Is Safe?

5
Comments 1
7 min read
Codificação segura, por que todos devs precisam conhecer?

Codificação segura, por que todos devs precisam conhecer?

17
Comments 3
2 min read
Tips and tricks for Backstage Software Templates

Tips and tricks for Backstage Software Templates

26
Comments
4 min read
How to strengthen security in your CI/CD pipeline

How to strengthen security in your CI/CD pipeline

3
Comments
8 min read
Docker Security: Clair

Docker Security: Clair

16
Comments
6 min read
Best practices for effective attack surface analysis

Best practices for effective attack surface analysis

3
Comments
7 min read
DevSecOps with AWS- IaC at scale - Getting started.

DevSecOps with AWS- IaC at scale - Getting started.

6
Comments
9 min read
How to use IAST to prove exploitable vulnerabilities within your first-party code

How to use IAST to prove exploitable vulnerabilities within your first-party code

Comments
10 min read
Yet another rant in favor of Kubernetes Secrets

Yet another rant in favor of Kubernetes Secrets

31
Comments 2
12 min read
Control your role! Kubernetes RBAC explored

Control your role! Kubernetes RBAC explored

Comments
9 min read
8 tips for securing your CI/CD pipeline with Snyk

8 tips for securing your CI/CD pipeline with Snyk

2
Comments
17 min read
Adopt Gitops Today - Here’s Why and How

Adopt Gitops Today - Here’s Why and How

Comments
8 min read
Platform Engineering: Building Your Developer Portal with Backstage (Pt 1)

Platform Engineering: Building Your Developer Portal with Backstage (Pt 1)

Comments
10 min read
GitHub High Availability – Why It Should Never Be Considered as a Regular Backup

GitHub High Availability – Why It Should Never Be Considered as a Regular Backup

Comments
5 min read
DAST in 5 Minutes (Or Less): What You Need to Know

DAST in 5 Minutes (Or Less): What You Need to Know

Comments
3 min read
Building a security-conscious CI/CD pipeline

Building a security-conscious CI/CD pipeline

2
Comments
7 min read
Configurando o agente DAST ISM Veracode em servidores Linux

Configurando o agente DAST ISM Veracode em servidores Linux

1
Comments
3 min read
How can we integrate security into the DevOps pipelines?

How can we integrate security into the DevOps pipelines?

3
Comments
7 min read
Level up your security skillset with New Relic

Level up your security skillset with New Relic

Comments
6 min read
Role-based Access Control in Golang with jwt-go

Role-based Access Control in Golang with jwt-go

42
Comments 10
7 min read
Top 8 penetration testing tools

Top 8 penetration testing tools

7
Comments 2
5 min read
Mitigate the hidden security risks of open source software libraries

Mitigate the hidden security risks of open source software libraries

1
Comments 1
9 min read
Ethical hacking techniques

Ethical hacking techniques

1
Comments
7 min read
The importance of platform engineers in a security program

The importance of platform engineers in a security program

1
Comments
4 min read
Secure Coding Best Practices

Secure Coding Best Practices

1
Comments
8 min read
Protecting Your Codebase: How to Identify and Mitigate SAST Vulnerabilities

Protecting Your Codebase: How to Identify and Mitigate SAST Vulnerabilities

4
Comments
5 min read
DevSecOps with AWS – ChatOps with AWS and AWS Developer Tools – Part 2

DevSecOps with AWS – ChatOps with AWS and AWS Developer Tools – Part 2

5
Comments
8 min read
DevOps vs DevSecOps: The Debate

DevOps vs DevSecOps: The Debate

4
Comments
10 min read
Platform Engineering and Security: A Very Short Introduction

Platform Engineering and Security: A Very Short Introduction

1
Comments
6 min read
GitLab High Availability and GitLab Geo Options

GitLab High Availability and GitLab Geo Options

Comments
5 min read
GitHub Security Best Practices – 15 Tips To Keep In Mind

GitHub Security Best Practices – 15 Tips To Keep In Mind

5
Comments
11 min read
loading...