Forem

# devsecops

Integrating security practices into the DevOps lifecycle.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
PCI DSS 4.0 Remediation 2025: 21 Battle-Tested Fixes
Cover image for PCI DSS 4.0 Remediation 2025: 21 Battle-Tested Fixes

PCI DSS 4.0 Remediation 2025: 21 Battle-Tested Fixes

2
Comments
6 min read
EU CRA: 12-Month Dev Roadmap for SBOM & Vulnerabilities (DEV-oriented)
Cover image for EU CRA: 12-Month Dev Roadmap for SBOM & Vulnerabilities (DEV-oriented)

EU CRA: 12-Month Dev Roadmap for SBOM & Vulnerabilities (DEV-oriented)

2
Comments
7 min read
Forget Everything You Knew About DevOps: The New Rules for 2025 |Are You Still Just "Doing DevOps"? It's Time to Evolve.
Cover image for Forget Everything You Knew About DevOps: The New Rules for 2025 |Are You Still Just "Doing DevOps"? It's Time to Evolve.

Forget Everything You Knew About DevOps: The New Rules for 2025 |Are You Still Just "Doing DevOps"? It's Time to Evolve.

5
Comments
3 min read
Why Software Design Patterns Matter for Cybersecurity
Cover image for Why Software Design Patterns Matter for Cybersecurity

Why Software Design Patterns Matter for Cybersecurity

1
Comments
4 min read
DevOps Threats Unwrapped: Mid-Year Report 2025
Cover image for DevOps Threats Unwrapped: Mid-Year Report 2025

DevOps Threats Unwrapped: Mid-Year Report 2025

Comments
8 min read
Crafting the Perfect Golden AMI for Auto Scaling Groups in AWS
Cover image for Crafting the Perfect Golden AMI for Auto Scaling Groups in AWS

Crafting the Perfect Golden AMI for Auto Scaling Groups in AWS

Comments
3 min read
Taming the Hydra: Why Your Kubernetes Secrets Management is Broken (And How CyberArk Conjur Fixes It)
Cover image for Taming the Hydra: Why Your Kubernetes Secrets Management is Broken (And How CyberArk Conjur Fixes It)

Taming the Hydra: Why Your Kubernetes Secrets Management is Broken (And How CyberArk Conjur Fixes It)

Comments
4 min read
DevSecOps Pipeline | Jenkins, Terraform, Docker, Trivy, AWS
Cover image for DevSecOps Pipeline | Jenkins, Terraform, Docker, Trivy, AWS

DevSecOps Pipeline | Jenkins, Terraform, Docker, Trivy, AWS

Comments
8 min read
OpenStack for DevOps Beginners: Hands-On with MicroStack
Cover image for OpenStack for DevOps Beginners: Hands-On with MicroStack

OpenStack for DevOps Beginners: Hands-On with MicroStack

Comments
3 min read
The Power of Scheduled Automated Backups for DevOps and SaaS
Cover image for The Power of Scheduled Automated Backups for DevOps and SaaS

The Power of Scheduled Automated Backups for DevOps and SaaS

Comments
8 min read
Applying Bandit SAST Tool to Secure Python Applications

Applying Bandit SAST Tool to Secure Python Applications

1
Comments 1
3 min read
🔍 Applying Flawfinder: A Lightweight SAST Tool to Secure C/C++ Codebases

🔍 Applying Flawfinder: A Lightweight SAST Tool to Secure C/C++ Codebases

1
Comments
4 min read
Troubleshooting Common DevOps Challenges
Cover image for Troubleshooting Common DevOps Challenges

Troubleshooting Common DevOps Challenges

55
Comments
3 min read
Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)
Cover image for Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Comments
1 min read
Shift Left Security Practices Developers Like
Cover image for Shift Left Security Practices Developers Like

Shift Left Security Practices Developers Like

Comments
8 min read
Git and Practical Tips for Security: Actionable Practices, Workflows, and Platform-Specific Guidance
Cover image for Git and Practical Tips for Security: Actionable Practices, Workflows, and Platform-Specific Guidance

Git and Practical Tips for Security: Actionable Practices, Workflows, and Platform-Specific Guidance

1
Comments
12 min read
Speaking Different Languages: How to Align Dev and Sec Teams Effectively
Cover image for Speaking Different Languages: How to Align Dev and Sec Teams Effectively

Speaking Different Languages: How to Align Dev and Sec Teams Effectively

Comments
5 min read
Authentication vs. Authorization

Authentication vs. Authorization

Comments
1 min read
Global Product Security Strategy: A Multi-Layered Framework (I.P. developed)
Cover image for Global Product Security Strategy: A Multi-Layered Framework (I.P. developed)

Global Product Security Strategy: A Multi-Layered Framework (I.P. developed)

1
Comments
4 min read
Secure at Inception: Introducing New Tools for Securing AI-Native Development
Cover image for Secure at Inception: Introducing New Tools for Securing AI-Native Development

Secure at Inception: Introducing New Tools for Securing AI-Native Development

Comments
7 min read
🚀 Pulumi AWS Provider 7.0: Multi-Region AWS IaC & IAM Role Chaining
Cover image for 🚀 Pulumi AWS Provider 7.0: Multi-Region AWS IaC & IAM Role Chaining

🚀 Pulumi AWS Provider 7.0: Multi-Region AWS IaC & IAM Role Chaining

4
Comments
1 min read
Falco With Kubernetes
Cover image for Falco With Kubernetes

Falco With Kubernetes

Comments
2 min read
How to Setup a LAMP Server at Home Using AWS (Step-by-Step Guide)
Cover image for How to Setup a LAMP Server at Home Using AWS (Step-by-Step Guide)

How to Setup a LAMP Server at Home Using AWS (Step-by-Step Guide)

7
Comments 2
3 min read
Dev Diary #2: Cloud Security plugin for JetBrains IDE
Cover image for Dev Diary #2: Cloud Security plugin for JetBrains IDE

Dev Diary #2: Cloud Security plugin for JetBrains IDE

Comments
3 min read
Istio - Service Mesh
Cover image for Istio - Service Mesh

Istio - Service Mesh

Comments
5 min read
loading...