Forem

# devsecops

Integrating security practices into the DevOps lifecycle.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Kubernetes 1.29: The Security Perspective

Kubernetes 1.29: The Security Perspective

Comments
1 min read
Securing Your Applications on AWS: Guide to Data Privacy and Protection

Securing Your Applications on AWS: Guide to Data Privacy and Protection

2
Comments
3 min read
DevOps vs DevSecOps
Cover image for DevOps vs DevSecOps

DevOps vs DevSecOps

2
Comments 2
2 min read
What to do if you expose a secret: How to stay calm and respond to an incident
Cover image for What to do if you expose a secret: How to stay calm and respond to an incident

What to do if you expose a secret: How to stay calm and respond to an incident

1
Comments
12 min read
Mastering Reliability in High-Velocity Software Development
Cover image for Mastering Reliability in High-Velocity Software Development

Mastering Reliability in High-Velocity Software Development

Comments
9 min read
Introducing to Jira Security: Best Practices For Protecting Your Data
Cover image for Introducing to Jira Security: Best Practices For Protecting Your Data

Introducing to Jira Security: Best Practices For Protecting Your Data

Comments
9 min read
DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 1
Cover image for DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 1

DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 1

32
Comments 1
6 min read
How to update cURL
Cover image for How to update cURL

How to update cURL

8
Comments
8 min read
Azure DevOps Pipeline: no secrets, no certificates

Azure DevOps Pipeline: no secrets, no certificates

6
Comments 4
6 min read
Handling Secrets with AWS Secrets Manager
Cover image for Handling Secrets with AWS Secrets Manager

Handling Secrets with AWS Secrets Manager

Comments
13 min read
GitHub Recovery Code
Cover image for GitHub Recovery Code

GitHub Recovery Code

1
Comments
4 min read
Securing Your Code with GitHub
Cover image for Securing Your Code with GitHub

Securing Your Code with GitHub

41
Comments 1
7 min read
Fixing Python Security Flaws with Bandit

Fixing Python Security Flaws with Bandit

Comments
3 min read
GitHub RepoJacking: Are You Sure Your GitHub Is Safe?
Cover image for GitHub RepoJacking: Are You Sure Your GitHub Is Safe?

GitHub RepoJacking: Are You Sure Your GitHub Is Safe?

5
Comments 1
7 min read
Codificação segura, por que todos devs precisam conhecer?

Codificação segura, por que todos devs precisam conhecer?

17
Comments 3
2 min read
Tips and tricks for Backstage Software Templates
Cover image for Tips and tricks for Backstage Software Templates

Tips and tricks for Backstage Software Templates

29
Comments
4 min read
How to strengthen security in your CI/CD pipeline
Cover image for How to strengthen security in your CI/CD pipeline

How to strengthen security in your CI/CD pipeline

3
Comments
8 min read
Docker Security: Clair
Cover image for Docker Security: Clair

Docker Security: Clair

17
Comments
6 min read
Best practices for effective attack surface analysis
Cover image for Best practices for effective attack surface analysis

Best practices for effective attack surface analysis

3
Comments
7 min read
DevSecOps with AWS- IaC at scale - Getting started.
Cover image for DevSecOps with AWS- IaC at scale - Getting started.

DevSecOps with AWS- IaC at scale - Getting started.

5
Comments
9 min read
How to use IAST to prove exploitable vulnerabilities within your first-party code
Cover image for How to use IAST to prove exploitable vulnerabilities within your first-party code

How to use IAST to prove exploitable vulnerabilities within your first-party code

Comments
10 min read
Yet another rant in favor of Kubernetes Secrets
Cover image for Yet another rant in favor of Kubernetes Secrets

Yet another rant in favor of Kubernetes Secrets

32
Comments 2
12 min read
Control your role! Kubernetes RBAC explored
Cover image for Control your role! Kubernetes RBAC explored

Control your role! Kubernetes RBAC explored

Comments
9 min read
8 tips for securing your CI/CD pipeline with Snyk
Cover image for 8 tips for securing your CI/CD pipeline with Snyk

8 tips for securing your CI/CD pipeline with Snyk

2
Comments
17 min read
Adopt Gitops Today - Here’s Why and How
Cover image for Adopt Gitops Today - Here’s Why and How

Adopt Gitops Today - Here’s Why and How

Comments
8 min read
loading...