Forem

# devsecops

Integrating security practices into the DevOps lifecycle.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Falco With Kubernetes
Cover image for Falco With Kubernetes

Falco With Kubernetes

4
Comments
2 min read
Vault With Kubernetes 🔐
Cover image for Vault With Kubernetes 🔐

Vault With Kubernetes 🔐

1
Comments
9 min read
Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)
Cover image for Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Comments
1 min read
How to Setup a LAMP Server at Home Using AWS (Step-by-Step Guide)
Cover image for How to Setup a LAMP Server at Home Using AWS (Step-by-Step Guide)

How to Setup a LAMP Server at Home Using AWS (Step-by-Step Guide)

6
Comments 2
3 min read
Istio - Service Mesh
Cover image for Istio - Service Mesh

Istio - Service Mesh

4
Comments
5 min read
Authentication vs. Authorization

Authentication vs. Authorization

Comments
1 min read
Global Product Security Strategy: A Multi-Layered Framework (I.P. developed)
Cover image for Global Product Security Strategy: A Multi-Layered Framework (I.P. developed)

Global Product Security Strategy: A Multi-Layered Framework (I.P. developed)

5
Comments
4 min read
Secure at Inception: Introducing New Tools for Securing AI-Native Development
Cover image for Secure at Inception: Introducing New Tools for Securing AI-Native Development

Secure at Inception: Introducing New Tools for Securing AI-Native Development

Comments
7 min read
🚀 Pulumi AWS Provider 7.0: Multi-Region AWS IaC & IAM Role Chaining
Cover image for 🚀 Pulumi AWS Provider 7.0: Multi-Region AWS IaC & IAM Role Chaining

🚀 Pulumi AWS Provider 7.0: Multi-Region AWS IaC & IAM Role Chaining

4
Comments
1 min read
Dev Diary #2: Cloud Security plugin for JetBrains IDE
Cover image for Dev Diary #2: Cloud Security plugin for JetBrains IDE

Dev Diary #2: Cloud Security plugin for JetBrains IDE

Comments
3 min read
Building your own SBOM Engine for .NET & Node.js

Building your own SBOM Engine for .NET & Node.js

1
Comments
1 min read
🧠 AI Malware Mutants: The Cybersecurity Crisis of 2025
Cover image for 🧠 AI Malware Mutants: The Cybersecurity Crisis of 2025

🧠 AI Malware Mutants: The Cybersecurity Crisis of 2025

Comments
3 min read
Breaking into Appsec/Devsecops without being a developer: Complete roadmap
Cover image for Breaking into Appsec/Devsecops without being a developer: Complete roadmap

Breaking into Appsec/Devsecops without being a developer: Complete roadmap

1
Comments
3 min read
From DevOps to DevSecOps: How Secure Software Development Evolved
Cover image for From DevOps to DevSecOps: How Secure Software Development Evolved

From DevOps to DevSecOps: How Secure Software Development Evolved

Comments
5 min read
DevSecOps Pipeline Security: Automation and Continuous Monitoring

DevSecOps Pipeline Security: Automation and Continuous Monitoring

1
Comments
3 min read
I Analyzed 47 DevSecOps Job Postings - Here's What Companies Actually Want
Cover image for I Analyzed 47 DevSecOps Job Postings - Here's What Companies Actually Want

I Analyzed 47 DevSecOps Job Postings - Here's What Companies Actually Want

12
Comments 6
6 min read
Think You’re Secure? Penetration Testing Will Tell You the Truth
Cover image for Think You’re Secure? Penetration Testing Will Tell You the Truth

Think You’re Secure? Penetration Testing Will Tell You the Truth

44
Comments
6 min read
AWS Security: KMS Keys
Cover image for AWS Security: KMS Keys

AWS Security: KMS Keys

1
Comments
2 min read
Using OWASP ZAP in Docker for DevSecOps Workflow
Cover image for Using OWASP ZAP in Docker for DevSecOps Workflow

Using OWASP ZAP in Docker for DevSecOps Workflow

Comments
2 min read
The Rise of AI-Generated Phishing Websites: How Hackers Are Weaponizing Generative Tools
Cover image for The Rise of AI-Generated Phishing Websites: How Hackers Are Weaponizing Generative Tools

The Rise of AI-Generated Phishing Websites: How Hackers Are Weaponizing Generative Tools

Comments
4 min read
Building Secure CI/CD Pipelines: DevSecOps in Action

Building Secure CI/CD Pipelines: DevSecOps in Action

Comments
8 min read
Secure Drupal: Best Practices for Enterprise Sites
Cover image for Secure Drupal: Best Practices for Enterprise Sites

Secure Drupal: Best Practices for Enterprise Sites

45
Comments
10 min read
Enhance your Code Security with Amazon Inspector
Cover image for Enhance your Code Security with Amazon Inspector

Enhance your Code Security with Amazon Inspector

5
Comments 1
4 min read
The Subtleties of Vulnerability Scanning in Go Projects
Cover image for The Subtleties of Vulnerability Scanning in Go Projects

The Subtleties of Vulnerability Scanning in Go Projects

Comments
4 min read
Building a Netflix Clone with DevSecOps: A Complete DevSecOps Project.
Cover image for Building a Netflix Clone with DevSecOps: A Complete DevSecOps Project.

Building a Netflix Clone with DevSecOps: A Complete DevSecOps Project.

7
Comments 1
12 min read
loading...