DEV Community

# devsecops

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Common SAML vulnerabilities and how to remediate them

Common SAML vulnerabilities and how to remediate them

2
Comments 1
4 min read
An introduction to IAM Roles

An introduction to IAM Roles

Comments
5 min read
Shifting Left Approach: Is It A Business Challenge?

Shifting Left Approach: Is It A Business Challenge?

Comments
9 min read
DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 2

DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 2

3
Comments
7 min read
Kubernetes 1.29: The Security Perspective

Kubernetes 1.29: The Security Perspective

Comments
1 min read
Kubernetes 1.29: The Security Perspective

Kubernetes 1.29: The Security Perspective

Comments
1 min read
Securing Your Applications on AWS: Guide to Data Privacy and Protection

Securing Your Applications on AWS: Guide to Data Privacy and Protection

2
Comments
3 min read
DevOps vs DevSecOps

DevOps vs DevSecOps

2
Comments 2
2 min read
What to do if you expose a secret: How to stay calm and respond to an incident

What to do if you expose a secret: How to stay calm and respond to an incident

1
Comments
12 min read
Mastering Reliability in High-Velocity Software Development

Mastering Reliability in High-Velocity Software Development

Comments
9 min read
Introducing to Jira Security: Best Practices For Protecting Your Data

Introducing to Jira Security: Best Practices For Protecting Your Data

Comments
9 min read
DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 1

DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 1

32
Comments 1
6 min read
How to update cURL

How to update cURL

7
Comments
8 min read
Azure DevOps Pipeline: no secrets, no certificates

Azure DevOps Pipeline: no secrets, no certificates

6
Comments 4
5 min read
Handling Secrets with AWS Secrets Manager

Handling Secrets with AWS Secrets Manager

Comments
13 min read
GitHub Recovery Code

GitHub Recovery Code

1
Comments
4 min read
Securing Your Code with GitHub

Securing Your Code with GitHub

40
Comments 1
7 min read
Identify and fix security vulnerabilities in Python code with Bandit

Identify and fix security vulnerabilities in Python code with Bandit

Comments
3 min read
GitHub RepoJacking: Are You Sure Your GitHub Is Safe?

GitHub RepoJacking: Are You Sure Your GitHub Is Safe?

5
Comments 1
7 min read
Codificação segura, por que todos devs precisam conhecer?

Codificação segura, por que todos devs precisam conhecer?

17
Comments 3
2 min read
Tips and tricks for Backstage Software Templates

Tips and tricks for Backstage Software Templates

25
Comments
4 min read
How to strengthen security in your CI/CD pipeline

How to strengthen security in your CI/CD pipeline

3
Comments
8 min read
Docker Security: Clair

Docker Security: Clair

15
Comments
6 min read
Best practices for effective attack surface analysis

Best practices for effective attack surface analysis

3
Comments
7 min read
DevSecOps with AWS- IaC at scale - Getting started.

DevSecOps with AWS- IaC at scale - Getting started.

6
Comments
9 min read
How to use IAST to prove exploitable vulnerabilities within your first-party code

How to use IAST to prove exploitable vulnerabilities within your first-party code

Comments
10 min read
Yet another rant in favor of Kubernetes Secrets

Yet another rant in favor of Kubernetes Secrets

31
Comments 2
12 min read
Control your role! Kubernetes RBAC explored

Control your role! Kubernetes RBAC explored

Comments
9 min read
8 tips for securing your CI/CD pipeline with Snyk

8 tips for securing your CI/CD pipeline with Snyk

2
Comments
17 min read
Adopt Gitops Today - Here’s Why and How

Adopt Gitops Today - Here’s Why and How

Comments
8 min read
Platform Engineering: Building Your Developer Portal with Backstage (Pt 1)

Platform Engineering: Building Your Developer Portal with Backstage (Pt 1)

Comments
10 min read
GitHub High Availability – Why It Should Never Be Considered as a Regular Backup

GitHub High Availability – Why It Should Never Be Considered as a Regular Backup

Comments
5 min read
DAST in 5 Minutes (Or Less): What You Need to Know

DAST in 5 Minutes (Or Less): What You Need to Know

Comments
3 min read
Building a security-conscious CI/CD pipeline

Building a security-conscious CI/CD pipeline

2
Comments
7 min read
Configurando o agente DAST ISM Veracode em servidores Linux

Configurando o agente DAST ISM Veracode em servidores Linux

1
Comments
3 min read
How can we integrate security into the DevOps pipelines?

How can we integrate security into the DevOps pipelines?

3
Comments
7 min read
Level up your security skillset with New Relic

Level up your security skillset with New Relic

Comments
6 min read
Role-based Access Control in Golang with jwt-go

Role-based Access Control in Golang with jwt-go

40
Comments 10
7 min read
Top 8 penetration testing tools

Top 8 penetration testing tools

7
Comments 2
5 min read
Mitigate the hidden security risks of open source software libraries

Mitigate the hidden security risks of open source software libraries

1
Comments 1
9 min read
Ethical hacking techniques

Ethical hacking techniques

1
Comments
7 min read
The importance of platform engineers in a security program

The importance of platform engineers in a security program

1
Comments
4 min read
Secure Coding Best Practices

Secure Coding Best Practices

1
Comments
8 min read
Protecting Your Codebase: How to Identify and Mitigate SAST Vulnerabilities

Protecting Your Codebase: How to Identify and Mitigate SAST Vulnerabilities

4
Comments
5 min read
DevSecOps with AWS – ChatOps with AWS and AWS Developer Tools – Part 2

DevSecOps with AWS – ChatOps with AWS and AWS Developer Tools – Part 2

5
Comments
8 min read
DevOps vs DevSecOps: The Debate

DevOps vs DevSecOps: The Debate

4
Comments
10 min read
GitLab High Availability and GitLab Geo Options

GitLab High Availability and GitLab Geo Options

Comments
5 min read
GitHub Security Best Practices – 15 Tips To Keep In Mind

GitHub Security Best Practices – 15 Tips To Keep In Mind

5
Comments
11 min read
Vulnerabilidade de Software Para Devs

Vulnerabilidade de Software Para Devs

35
Comments 1
4 min read
Securing the Modern Software Development Lifecycle: Embracing DevSecOps

Securing the Modern Software Development Lifecycle: Embracing DevSecOps

Comments
10 min read
What’s the Difference between AppSec, Software Security, Cybersecurity, and DevSecOps?

What’s the Difference between AppSec, Software Security, Cybersecurity, and DevSecOps?

3
Comments
6 min read
Os diferentes modos de se realizar SAST com a Veracode

Os diferentes modos de se realizar SAST com a Veracode

3
Comments
4 min read
Snyk Container: GitLab Container Registry easy integration

Snyk Container: GitLab Container Registry easy integration

2
Comments
1 min read
DevSecOps with AWS- Integrate Azure DevOps for CDK deployments Part-2

DevSecOps with AWS- Integrate Azure DevOps for CDK deployments Part-2

6
Comments
7 min read
Modelagem de Ameaças - Introdução

Modelagem de Ameaças - Introdução

2
Comments
3 min read
Princípios de Segurança Cibernética

Princípios de Segurança Cibernética

2
Comments
7 min read
DevSecOps with AWS- Integrate Azure DevOps for CDK deployments Part-1

DevSecOps with AWS- Integrate Azure DevOps for CDK deployments Part-1

4
Comments
7 min read
How To Secure Your CI/CD Pipeline

How To Secure Your CI/CD Pipeline

1
Comments
5 min read
The Everything Guide to Data Collection in DevSecOps

The Everything Guide to Data Collection in DevSecOps

1
Comments
8 min read
Documentation as Code- Reverse Diagram - Creating a diagram from AWS setup

Documentation as Code- Reverse Diagram - Creating a diagram from AWS setup

3
Comments 2
3 min read
loading...