Forem

# devsecops

Integrating security practices into the DevOps lifecycle.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
GitHub RepoJacking: Are You Sure Your GitHub Is Safe?
Cover image for GitHub RepoJacking: Are You Sure Your GitHub Is Safe?

GitHub RepoJacking: Are You Sure Your GitHub Is Safe?

5
Comments 1
7 min read
Codificação segura, por que todos devs precisam conhecer?

Codificação segura, por que todos devs precisam conhecer?

17
Comments 3
2 min read
Tips and tricks for Backstage Software Templates
Cover image for Tips and tricks for Backstage Software Templates

Tips and tricks for Backstage Software Templates

29
Comments
4 min read
How to strengthen security in your CI/CD pipeline
Cover image for How to strengthen security in your CI/CD pipeline

How to strengthen security in your CI/CD pipeline

3
Comments
8 min read
Docker Security: Clair
Cover image for Docker Security: Clair

Docker Security: Clair

17
Comments
6 min read
Best practices for effective attack surface analysis
Cover image for Best practices for effective attack surface analysis

Best practices for effective attack surface analysis

3
Comments
7 min read
DevSecOps with AWS- IaC at scale - Getting started.
Cover image for DevSecOps with AWS- IaC at scale - Getting started.

DevSecOps with AWS- IaC at scale - Getting started.

5
Comments
9 min read
How to use IAST to prove exploitable vulnerabilities within your first-party code
Cover image for How to use IAST to prove exploitable vulnerabilities within your first-party code

How to use IAST to prove exploitable vulnerabilities within your first-party code

Comments
10 min read
Yet another rant in favor of Kubernetes Secrets
Cover image for Yet another rant in favor of Kubernetes Secrets

Yet another rant in favor of Kubernetes Secrets

32
Comments 2
12 min read
Control your role! Kubernetes RBAC explored
Cover image for Control your role! Kubernetes RBAC explored

Control your role! Kubernetes RBAC explored

Comments
9 min read
8 tips for securing your CI/CD pipeline with Snyk
Cover image for 8 tips for securing your CI/CD pipeline with Snyk

8 tips for securing your CI/CD pipeline with Snyk

2
Comments
17 min read
Adopt Gitops Today - Here’s Why and How
Cover image for Adopt Gitops Today - Here’s Why and How

Adopt Gitops Today - Here’s Why and How

Comments
8 min read
Platform Engineering: Building Your Developer Portal with Backstage (Pt 1)
Cover image for Platform Engineering: Building Your Developer Portal with Backstage (Pt 1)

Platform Engineering: Building Your Developer Portal with Backstage (Pt 1)

Comments
10 min read
GitHub High Availability – Why It Should Never Be Considered as a Regular Backup
Cover image for GitHub High Availability – Why It Should Never Be Considered as a Regular Backup

GitHub High Availability – Why It Should Never Be Considered as a Regular Backup

Comments
5 min read
DAST in 5 Minutes (Or Less): What You Need to Know

DAST in 5 Minutes (Or Less): What You Need to Know

Comments
3 min read
Building a security-conscious CI/CD pipeline
Cover image for Building a security-conscious CI/CD pipeline

Building a security-conscious CI/CD pipeline

2
Comments
7 min read
Configurando o agente DAST ISM Veracode em servidores Linux
Cover image for Configurando o agente DAST ISM Veracode em servidores Linux

Configurando o agente DAST ISM Veracode em servidores Linux

1
Comments
3 min read
How can we integrate security into the DevOps pipelines?
Cover image for How can we integrate security into the DevOps pipelines?

How can we integrate security into the DevOps pipelines?

3
Comments
7 min read
Level up your security skillset with New Relic
Cover image for Level up your security skillset with New Relic

Level up your security skillset with New Relic

Comments
6 min read
Role-based Access Control in Golang with jwt-go
Cover image for Role-based Access Control in Golang with jwt-go

Role-based Access Control in Golang with jwt-go

51
Comments 10
7 min read
Top 8 penetration testing tools
Cover image for Top 8 penetration testing tools

Top 8 penetration testing tools

7
Comments 2
5 min read
Mitigate the hidden security risks of open source software libraries
Cover image for Mitigate the hidden security risks of open source software libraries

Mitigate the hidden security risks of open source software libraries

1
Comments 1
9 min read
Ethical hacking techniques
Cover image for Ethical hacking techniques

Ethical hacking techniques

1
Comments
7 min read
The importance of platform engineers in a security program
Cover image for The importance of platform engineers in a security program

The importance of platform engineers in a security program

1
Comments
4 min read
Secure Coding Best Practices
Cover image for Secure Coding Best Practices

Secure Coding Best Practices

1
Comments
8 min read
loading...