Forem

# devsecops

Integrating security practices into the DevOps lifecycle.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Inside WatchTower: 4-layer defacement detection in async Python

Inside WatchTower: 4-layer defacement detection in async Python

Comments
8 min read
Vulnerability Remediation Prioritization — How to Handle Hundreds of CVEs Without Getting Overwhelmed
Cover image for Vulnerability Remediation Prioritization — How to Handle Hundreds of CVEs Without Getting Overwhelmed

Vulnerability Remediation Prioritization — How to Handle Hundreds of CVEs Without Getting Overwhelmed

Comments
8 min read
Python pip Security — How to Scan Your Dependencies for Vulnerabilities (requirements.txt, Pipfile, Poetry)
Cover image for Python pip Security — How to Scan Your Dependencies for Vulnerabilities (requirements.txt, Pipfile, Poetry)

Python pip Security — How to Scan Your Dependencies for Vulnerabilities (requirements.txt, Pipfile, Poetry)

Comments
9 min read
We rotated our JWKS without overlap. Here is the 4-minute window that broke prod.
Cover image for We rotated our JWKS without overlap. Here is the 4-minute window that broke prod.

We rotated our JWKS without overlap. Here is the 4-minute window that broke prod.

3
Comments
5 min read
Log4Shell 2026 — Is Your Application Still Vulnerable?
Cover image for Log4Shell 2026 — Is Your Application Still Vulnerable?

Log4Shell 2026 — Is Your Application Still Vulnerable?

Comments
7 min read
What is Software Composition Analysis (SCA)? The Complete Guide for 2026
Cover image for What is Software Composition Analysis (SCA)? The Complete Guide for 2026

What is Software Composition Analysis (SCA)? The Complete Guide for 2026

Comments
10 min read
The Rise of the Machine Identity

The Rise of the Machine Identity

1
Comments
2 min read
Attackers Are Not Breaking In Anymore — They Are Logging In as Your Machines

Attackers Are Not Breaking In Anymore — They Are Logging In as Your Machines

Comments
1 min read
🔐Enforcing image provenance in Kubernetes using Cosign + Sigstore + Kyverno

🔐Enforcing image provenance in Kubernetes using Cosign + Sigstore + Kyverno

Comments
2 min read
Auth regression tests for CI: what to assert and why
Cover image for Auth regression tests for CI: what to assert and why

Auth regression tests for CI: what to assert and why

Comments
5 min read
IPv8 — a late April Fool's joke?

IPv8 — a late April Fool's joke?

Comments
12 min read
Why Software-Only Wallets are a Dead End for the AI Era

Why Software-Only Wallets are a Dead End for the AI Era

Comments
1 min read
What the Mythos-Ready Briefing Says About Credentials
Cover image for What the Mythos-Ready Briefing Says About Credentials

What the Mythos-Ready Briefing Says About Credentials

Comments
6 min read
Open Source OWASP API Security Scanner with AI-Assisted Testing
Cover image for Open Source OWASP API Security Scanner with AI-Assisted Testing

Open Source OWASP API Security Scanner with AI-Assisted Testing

1
Comments
4 min read
Comparison: Kyverno 1.13 vs. OPA 0.70 for DevSecOps Pipeline Integration

Comparison: Kyverno 1.13 vs. OPA 0.70 for DevSecOps Pipeline Integration

Comments
4 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.