DEV Community

# devsecops

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
DevSecOps 2024: The Game-Changing Trends in AI, Automation, and Cloud Tech

DevSecOps 2024: The Game-Changing Trends in AI, Automation, and Cloud Tech

Comments
4 min read
DevSecops Tools in CICD Pipeline

DevSecops Tools in CICD Pipeline

Comments
4 min read
DevSecOps Fundamentals: Security in the Jenkins Pipeline

DevSecOps Fundamentals: Security in the Jenkins Pipeline

1
Comments
5 min read
Dive into AI and LLM learning with the new Snyk Learn learning path

Dive into AI and LLM learning with the new Snyk Learn learning path

Comments
2 min read
Demystifying DevOps vs DevSecOps

Demystifying DevOps vs DevSecOps

Comments
3 min read
Introduction to Minder

Introduction to Minder

1
Comments
2 min read
Clear Link Between DevSecOps and Data Engineering

Clear Link Between DevSecOps and Data Engineering

Comments
1 min read
The Future of DevSecOps: Enhancing Your Software Security Development with NIST Guidelines

The Future of DevSecOps: Enhancing Your Software Security Development with NIST Guidelines

3
Comments
4 min read
Implement CIS Top 18 Controls in Your Organization

Implement CIS Top 18 Controls in Your Organization

Comments
4 min read
The State of DevOps Threats Report – GitProtect.io’s Study Highlights The Major Cyber Risks and Security Best Practices

The State of DevOps Threats Report – GitProtect.io’s Study Highlights The Major Cyber Risks and Security Best Practices

Comments
6 min read
Unleashing the Power of DevOps Transforming Collaboration and Efficiency

Unleashing the Power of DevOps Transforming Collaboration and Efficiency

Comments
2 min read
Automate Uploading Security Scan Results to DefectDojo

Automate Uploading Security Scan Results to DefectDojo

Comments
5 min read
Javascript support now in Beta!

Javascript support now in Beta!

Comments
1 min read
The Impact of Security Misconfigurations on Data Breach Incidents

The Impact of Security Misconfigurations on Data Breach Incidents

Comments
5 min read
3 Security Teams To Think About Implementing For Your Organization

3 Security Teams To Think About Implementing For Your Organization

2
Comments
3 min read
DevSecOps en las pipelines de Terraform

DevSecOps en las pipelines de Terraform

Comments
3 min read
Policy as Code with Kyverno

Policy as Code with Kyverno

Comments
3 min read
Enhancing User Experience With Browser Synthetic Monitoring

Enhancing User Experience With Browser Synthetic Monitoring

1
Comments
4 min read
Comprehensive DevSecOps Pipeline: Secure & Scalable Kubernetes Deployment with AWS EKS, ArgoCD and Jenkins Integration

Comprehensive DevSecOps Pipeline: Secure & Scalable Kubernetes Deployment with AWS EKS, ArgoCD and Jenkins Integration

1
Comments
4 min read
8 Ways AI Can Maximize the Value of Logs

8 Ways AI Can Maximize the Value of Logs

2
Comments
6 min read
Getting Into DevSecOps

Getting Into DevSecOps

Comments
1 min read
Death of DevSecOps, Part 3

Death of DevSecOps, Part 3

Comments
3 min read
Securing Your Data: How to Safely Back Up a Single File on Bitbucket

Securing Your Data: How to Safely Back Up a Single File on Bitbucket

1
Comments
6 min read
Understanding Threat Modeling: 🛡️ Securing Your Digital Assets Effectively

Understanding Threat Modeling: 🛡️ Securing Your Digital Assets Effectively

Comments
2 min read
Integrating Azure Key Vault for Secrets with GitHub Action Workflows - Part 2

Integrating Azure Key Vault for Secrets with GitHub Action Workflows - Part 2

5
Comments
10 min read
Best Practices for Using GitHub Secrets - Part 1

Best Practices for Using GitHub Secrets - Part 1

5
Comments
8 min read
SAML SSO In Terms Of GitHub Security

SAML SSO In Terms Of GitHub Security

1
Comments
6 min read
Secret Scanning in CI pipelines using Gitleaks and Pre-commit Hook.

Secret Scanning in CI pipelines using Gitleaks and Pre-commit Hook.

9
Comments
6 min read
DevOps Meets Cybersecurity -> DevSecOps

DevOps Meets Cybersecurity -> DevSecOps

2
Comments
5 min read
Cloud Over-Privileged Accounts: A Recipe for Disaster (and How to Avoid It)

Cloud Over-Privileged Accounts: A Recipe for Disaster (and How to Avoid It)

1
Comments
3 min read
Docker Security Checklist: Are You Production Ready?

Docker Security Checklist: Are You Production Ready?

5
Comments
3 min read
Building a Secure CI/CD Pipeline: Beyond the Basics of Security Testing

Building a Secure CI/CD Pipeline: Beyond the Basics of Security Testing

52
Comments
9 min read
Mastering Version Control with Git: Beyond the Basics

Mastering Version Control with Git: Beyond the Basics

288
Comments 1
10 min read
The Age Of SaaS: How To Protect Your Data

The Age Of SaaS: How To Protect Your Data

Comments
10 min read
Building a Rock-Solid Foundation with Infrastructure as Code (IaC)

Building a Rock-Solid Foundation with Infrastructure as Code (IaC)

19
Comments 1
8 min read
Implement a DevSecOps Pipeline with GitHub Actions

Implement a DevSecOps Pipeline with GitHub Actions

1
Comments 1
5 min read
Building a Fort Knox DevSecOps: Comprehensive Security Practices

Building a Fort Knox DevSecOps: Comprehensive Security Practices

21
Comments
10 min read
Cybersecurity and the State of the Modern Threat Landscape: A Deep Dive on CNAPPs

Cybersecurity and the State of the Modern Threat Landscape: A Deep Dive on CNAPPs

Comments
10 min read
What is HashiCorp Vault?

What is HashiCorp Vault?

Comments
3 min read
Zero Trust Security: Beyond the Castle Walls

Zero Trust Security: Beyond the Castle Walls

12
Comments
11 min read
What is DevSecOps? A Comprehensive Look at DevSecOps

What is DevSecOps? A Comprehensive Look at DevSecOps

98
Comments 4
12 min read
Call for action: Exploring vulnerabilities in Github Actions

Call for action: Exploring vulnerabilities in Github Actions

1
Comments
16 min read
Cloud-Native Security: A Guide to Microservices and Serverless Protection

Cloud-Native Security: A Guide to Microservices and Serverless Protection

16
Comments 1
11 min read
Death of DevSecOps, Part 2

Death of DevSecOps, Part 2

2
Comments
4 min read
Pipeline Integrity and Security in DevSecOps

Pipeline Integrity and Security in DevSecOps

Comments
11 min read
Network Policy in Kubernetes

Network Policy in Kubernetes

8
Comments 1
2 min read
Advanced CI/CD Pipeline Configuration Strategies

Advanced CI/CD Pipeline Configuration Strategies

136
Comments 13
9 min read
Secure-by-Design Software in DevSecOps

Secure-by-Design Software in DevSecOps

1
Comments
13 min read
DevSecOps Made Easy (Pt 2) - Stay clear of any lock-in

DevSecOps Made Easy (Pt 2) - Stay clear of any lock-in

1
Comments
2 min read
Measuring and Enhancing DevSecOps Posture: Key Metrics

Measuring and Enhancing DevSecOps Posture: Key Metrics

Comments
4 min read
How You Can Use Logs to Feed Security

How You Can Use Logs to Feed Security

Comments
6 min read
Set up FreeIPA Server & Client.

Set up FreeIPA Server & Client.

2
Comments
4 min read
DevSecOps: It’s Time To Pay For Your Demand – Not Ingestion

DevSecOps: It’s Time To Pay For Your Demand – Not Ingestion

1
Comments
5 min read
From Theory to Practice: Unlocking DevSecOps Excellence with Proven Best Practices

From Theory to Practice: Unlocking DevSecOps Excellence with Proven Best Practices

Comments
4 min read
Deploying a Bulletproof Photo Sharing App with DevSecOps Terraform, AWS, EKS and Chaos Engineering

Deploying a Bulletproof Photo Sharing App with DevSecOps Terraform, AWS, EKS and Chaos Engineering

10
Comments 2
6 min read
Vulnerability Management Lifecycle in DevSecOps

Vulnerability Management Lifecycle in DevSecOps

3
Comments
11 min read
GenAI-Powered Digital Threads - AI Security Under the Hood, Part II

GenAI-Powered Digital Threads - AI Security Under the Hood, Part II

1
Comments
5 min read
Cloud Security and Resilience: DevSecOps Tools and Practices

Cloud Security and Resilience: DevSecOps Tools and Practices

7
Comments 1
2 min read
Kickstarting Your DevSecOps Career - The 4 Essential Certifications You Need

Kickstarting Your DevSecOps Career - The 4 Essential Certifications You Need

6
Comments
5 min read
Responsibilities of a modern CISO

Responsibilities of a modern CISO

2
Comments
6 min read
loading...