Forem

# devsecops

Integrating security practices into the DevOps lifecycle.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
OpenStack for DevOps Beginners: Hands-On with MicroStack
Cover image for OpenStack for DevOps Beginners: Hands-On with MicroStack

OpenStack for DevOps Beginners: Hands-On with MicroStack

Comments
3 min read
Why Software Design Patterns Matter for Cybersecurity
Cover image for Why Software Design Patterns Matter for Cybersecurity

Why Software Design Patterns Matter for Cybersecurity

1
Comments
4 min read
DevOps Threats Unwrapped: Mid-Year Report 2025
Cover image for DevOps Threats Unwrapped: Mid-Year Report 2025

DevOps Threats Unwrapped: Mid-Year Report 2025

Comments
8 min read
The Power of Scheduled Automated Backups for DevOps and SaaS
Cover image for The Power of Scheduled Automated Backups for DevOps and SaaS

The Power of Scheduled Automated Backups for DevOps and SaaS

Comments
8 min read
Crafting the Perfect Golden AMI for Auto Scaling Groups in AWS
Cover image for Crafting the Perfect Golden AMI for Auto Scaling Groups in AWS

Crafting the Perfect Golden AMI for Auto Scaling Groups in AWS

Comments
3 min read
🔍 Applying Flawfinder: A Lightweight SAST Tool to Secure C/C++ Codebases

🔍 Applying Flawfinder: A Lightweight SAST Tool to Secure C/C++ Codebases

2
Comments
4 min read
Taming the Hydra: Why Your Kubernetes Secrets Management is Broken (And How CyberArk Conjur Fixes It)
Cover image for Taming the Hydra: Why Your Kubernetes Secrets Management is Broken (And How CyberArk Conjur Fixes It)

Taming the Hydra: Why Your Kubernetes Secrets Management is Broken (And How CyberArk Conjur Fixes It)

Comments
4 min read
Speaking Different Languages: How to Align Dev and Sec Teams Effectively
Cover image for Speaking Different Languages: How to Align Dev and Sec Teams Effectively

Speaking Different Languages: How to Align Dev and Sec Teams Effectively

Comments
5 min read
Applying Bandit SAST Tool to Secure Python Applications

Applying Bandit SAST Tool to Secure Python Applications

2
Comments 1
3 min read
Troubleshooting Common DevOps Challenges
Cover image for Troubleshooting Common DevOps Challenges

Troubleshooting Common DevOps Challenges

35
Comments
3 min read
Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)
Cover image for Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Comments
1 min read
How to Setup a LAMP Server at Home Using AWS (Step-by-Step Guide)
Cover image for How to Setup a LAMP Server at Home Using AWS (Step-by-Step Guide)

How to Setup a LAMP Server at Home Using AWS (Step-by-Step Guide)

6
Comments 2
3 min read
Shift Left Security Practices Developers Like
Cover image for Shift Left Security Practices Developers Like

Shift Left Security Practices Developers Like

1
Comments
8 min read
Git and Practical Tips for Security: Actionable Practices, Workflows, and Platform-Specific Guidance
Cover image for Git and Practical Tips for Security: Actionable Practices, Workflows, and Platform-Specific Guidance

Git and Practical Tips for Security: Actionable Practices, Workflows, and Platform-Specific Guidance

1
Comments
12 min read
Authentication vs. Authorization

Authentication vs. Authorization

Comments
1 min read
Global Product Security Strategy: A Multi-Layered Framework (I.P. developed)
Cover image for Global Product Security Strategy: A Multi-Layered Framework (I.P. developed)

Global Product Security Strategy: A Multi-Layered Framework (I.P. developed)

1
Comments
4 min read
Secure at Inception: Introducing New Tools for Securing AI-Native Development
Cover image for Secure at Inception: Introducing New Tools for Securing AI-Native Development

Secure at Inception: Introducing New Tools for Securing AI-Native Development

Comments
7 min read
🚀 Pulumi AWS Provider 7.0: Multi-Region AWS IaC & IAM Role Chaining
Cover image for 🚀 Pulumi AWS Provider 7.0: Multi-Region AWS IaC & IAM Role Chaining

🚀 Pulumi AWS Provider 7.0: Multi-Region AWS IaC & IAM Role Chaining

4
Comments
1 min read
Falco With Kubernetes
Cover image for Falco With Kubernetes

Falco With Kubernetes

2
Comments
2 min read
Dev Diary #2: Cloud Security plugin for JetBrains IDE
Cover image for Dev Diary #2: Cloud Security plugin for JetBrains IDE

Dev Diary #2: Cloud Security plugin for JetBrains IDE

Comments
3 min read
Istio - Service Mesh
Cover image for Istio - Service Mesh

Istio - Service Mesh

1
Comments
5 min read
Building your own SBOM Engine for .NET & Node.js

Building your own SBOM Engine for .NET & Node.js

1
Comments
1 min read
Vault With Kubernetes 🔐
Cover image for Vault With Kubernetes 🔐

Vault With Kubernetes 🔐

1
Comments
9 min read
🧠 AI Malware Mutants: The Cybersecurity Crisis of 2025
Cover image for 🧠 AI Malware Mutants: The Cybersecurity Crisis of 2025

🧠 AI Malware Mutants: The Cybersecurity Crisis of 2025

Comments
3 min read
Breaking into Appsec/Devsecops without being a developer: Complete roadmap
Cover image for Breaking into Appsec/Devsecops without being a developer: Complete roadmap

Breaking into Appsec/Devsecops without being a developer: Complete roadmap

1
Comments
3 min read
loading...