Forem

# devsecops

Integrating security practices into the DevOps lifecycle.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Idempotent Dockerfiles: Desirable Ideal or Misplaced Objective?

Idempotent Dockerfiles: Desirable Ideal or Misplaced Objective?

Comments
5 min read
Building a DevSecOps Pipeline on AWS: From Security Audit to Daily Deployments

Building a DevSecOps Pipeline on AWS: From Security Audit to Daily Deployments

Comments
15 min read
What is IDP and why we need it?
Cover image for What is IDP and why we need it?

What is IDP and why we need it?

Comments
1 min read
Opsfolio - From Interview Task to Production: Building a Security-First DevSecOps Platform

Opsfolio - From Interview Task to Production: Building a Security-First DevSecOps Platform

Comments
5 min read
Ephemeral Vulnerability Scanner: Pure Client-Side JS for Windows/Linux/macOS Vuln Analysis

Ephemeral Vulnerability Scanner: Pure Client-Side JS for Windows/Linux/macOS Vuln Analysis

Comments
1 min read
Automating Compliance Checks in CI/CD Pipelines with Rego

Automating Compliance Checks in CI/CD Pipelines with Rego

Comments
2 min read
How to Prevent Backup-related Throttling Without Losing Data (or Mind)
Cover image for How to Prevent Backup-related Throttling Without Losing Data (or Mind)

How to Prevent Backup-related Throttling Without Losing Data (or Mind)

Comments
6 min read
osquery + OpenTelemetry = ❤️

osquery + OpenTelemetry = ❤️

Comments
1 min read
🚀 8 Software Trends Every Senior Developer Should Watch in 2026
Cover image for 🚀 8 Software Trends Every Senior Developer Should Watch in 2026

🚀 8 Software Trends Every Senior Developer Should Watch in 2026

3
Comments
2 min read
Use AI to Speed Up Security Hardening (and Read This First)
Cover image for Use AI to Speed Up Security Hardening (and Read This First)

Use AI to Speed Up Security Hardening (and Read This First)

Comments
1 min read
Pin It or Bin It

Pin It or Bin It

Comments
3 min read
🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

🚀 Introducing VulnFeed - Real-Time Vulnerability Tracking for CISA & Red Hat

1
Comments 1
1 min read
From APK to Source Code: The Dark Art of App Decompiling (2025 Edition)
Cover image for From APK to Source Code: The Dark Art of App Decompiling (2025 Edition)

From APK to Source Code: The Dark Art of App Decompiling (2025 Edition)

Comments
1 min read
How DevSecOps Redefines QA Workflows
Cover image for How DevSecOps Redefines QA Workflows

How DevSecOps Redefines QA Workflows

5
Comments
5 min read
DevSecOps: Modelo de madurez y alternativas de implementación
Cover image for DevSecOps: Modelo de madurez y alternativas de implementación

DevSecOps: Modelo de madurez y alternativas de implementación

5
Comments
10 min read
PCI DSS 4.0 Remediation 2025: 21 Battle-Tested Fixes
Cover image for PCI DSS 4.0 Remediation 2025: 21 Battle-Tested Fixes

PCI DSS 4.0 Remediation 2025: 21 Battle-Tested Fixes

2
Comments
6 min read
How to Automate Vulnerability Scans with Trivy
Cover image for How to Automate Vulnerability Scans with Trivy

How to Automate Vulnerability Scans with Trivy

75
Comments
5 min read
EU CRA: 12-Month Dev Roadmap for SBOM & Vulnerabilities (DEV-oriented)
Cover image for EU CRA: 12-Month Dev Roadmap for SBOM & Vulnerabilities (DEV-oriented)

EU CRA: 12-Month Dev Roadmap for SBOM & Vulnerabilities (DEV-oriented)

2
Comments
7 min read
I put an Air-Gapped Neural Network in my pocket (Python on Android)

I put an Air-Gapped Neural Network in my pocket (Python on Android)

4
Comments
2 min read
Fast Code, Fragile Security: How DevSecOps Lost Control (and How We Fix It)
Cover image for Fast Code, Fragile Security: How DevSecOps Lost Control (and How We Fix It)

Fast Code, Fragile Security: How DevSecOps Lost Control (and How We Fix It)

Comments 1
29 min read
EnvSecOps - What It Actually Is (And Why DevSecOps Won't Cut It)

EnvSecOps - What It Actually Is (And Why DevSecOps Won't Cut It)

Comments
3 min read
Why Software Design Patterns Matter for Cybersecurity
Cover image for Why Software Design Patterns Matter for Cybersecurity

Why Software Design Patterns Matter for Cybersecurity

1
Comments
4 min read
DevOps Threats Unwrapped: Mid-Year Report 2025
Cover image for DevOps Threats Unwrapped: Mid-Year Report 2025

DevOps Threats Unwrapped: Mid-Year Report 2025

Comments
8 min read
Crafting the Perfect Golden AMI for Auto Scaling Groups in AWS
Cover image for Crafting the Perfect Golden AMI for Auto Scaling Groups in AWS

Crafting the Perfect Golden AMI for Auto Scaling Groups in AWS

Comments
3 min read
Taming the Hydra: Why Your Kubernetes Secrets Management is Broken (And How CyberArk Conjur Fixes It)
Cover image for Taming the Hydra: Why Your Kubernetes Secrets Management is Broken (And How CyberArk Conjur Fixes It)

Taming the Hydra: Why Your Kubernetes Secrets Management is Broken (And How CyberArk Conjur Fixes It)

Comments
4 min read
loading...