Forem

# devsecops

Integrating security practices into the DevOps lifecycle.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Forget Everything You Knew About DevOps: The New Rules for 2025 |Are You Still Just "Doing DevOps"? It's Time to Evolve.
Cover image for Forget Everything You Knew About DevOps: The New Rules for 2025 |Are You Still Just "Doing DevOps"? It's Time to Evolve.

Forget Everything You Knew About DevOps: The New Rules for 2025 |Are You Still Just "Doing DevOps"? It's Time to Evolve.

1
Comments
3 min read
OpenStack for DevOps Beginners: Hands-On with MicroStack
Cover image for OpenStack for DevOps Beginners: Hands-On with MicroStack

OpenStack for DevOps Beginners: Hands-On with MicroStack

Comments
3 min read
The Power of Scheduled Automated Backups for DevOps and SaaS
Cover image for The Power of Scheduled Automated Backups for DevOps and SaaS

The Power of Scheduled Automated Backups for DevOps and SaaS

Comments
8 min read
Applying Bandit SAST Tool to Secure Python Applications

Applying Bandit SAST Tool to Secure Python Applications

1
Comments 1
3 min read
🔍 Applying Flawfinder: A Lightweight SAST Tool to Secure C/C++ Codebases

🔍 Applying Flawfinder: A Lightweight SAST Tool to Secure C/C++ Codebases

1
Comments
4 min read
Troubleshooting Common DevOps Challenges
Cover image for Troubleshooting Common DevOps Challenges

Troubleshooting Common DevOps Challenges

55
Comments
3 min read
Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)
Cover image for Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Workload Identity Federation Explained in 2 Minutes (with a School Trip Analogy)

Comments
1 min read
Shift Left Security Practices Developers Like
Cover image for Shift Left Security Practices Developers Like

Shift Left Security Practices Developers Like

Comments
8 min read
Git and Practical Tips for Security: Actionable Practices, Workflows, and Platform-Specific Guidance
Cover image for Git and Practical Tips for Security: Actionable Practices, Workflows, and Platform-Specific Guidance

Git and Practical Tips for Security: Actionable Practices, Workflows, and Platform-Specific Guidance

1
Comments
12 min read
Speaking Different Languages: How to Align Dev and Sec Teams Effectively
Cover image for Speaking Different Languages: How to Align Dev and Sec Teams Effectively

Speaking Different Languages: How to Align Dev and Sec Teams Effectively

Comments
5 min read
Authentication vs. Authorization

Authentication vs. Authorization

Comments
1 min read
Global Product Security Strategy: A Multi-Layered Framework (I.P. developed)
Cover image for Global Product Security Strategy: A Multi-Layered Framework (I.P. developed)

Global Product Security Strategy: A Multi-Layered Framework (I.P. developed)

1
Comments
4 min read
Secure at Inception: Introducing New Tools for Securing AI-Native Development
Cover image for Secure at Inception: Introducing New Tools for Securing AI-Native Development

Secure at Inception: Introducing New Tools for Securing AI-Native Development

Comments
7 min read
🚀 Pulumi AWS Provider 7.0: Multi-Region AWS IaC & IAM Role Chaining
Cover image for 🚀 Pulumi AWS Provider 7.0: Multi-Region AWS IaC & IAM Role Chaining

🚀 Pulumi AWS Provider 7.0: Multi-Region AWS IaC & IAM Role Chaining

4
Comments
1 min read
Falco With Kubernetes
Cover image for Falco With Kubernetes

Falco With Kubernetes

Comments
2 min read
How to Setup a LAMP Server at Home Using AWS (Step-by-Step Guide)
Cover image for How to Setup a LAMP Server at Home Using AWS (Step-by-Step Guide)

How to Setup a LAMP Server at Home Using AWS (Step-by-Step Guide)

7
Comments 2
3 min read
Istio - Service Mesh
Cover image for Istio - Service Mesh

Istio - Service Mesh

Comments
5 min read
Building your own SBOM Engine for .NET & Node.js

Building your own SBOM Engine for .NET & Node.js

1
Comments
1 min read
Vault With Kubernetes 🔐
Cover image for Vault With Kubernetes 🔐

Vault With Kubernetes 🔐

1
Comments
9 min read
🧠 AI Malware Mutants: The Cybersecurity Crisis of 2025
Cover image for 🧠 AI Malware Mutants: The Cybersecurity Crisis of 2025

🧠 AI Malware Mutants: The Cybersecurity Crisis of 2025

Comments
3 min read
From DevOps to DevSecOps: How Secure Software Development Evolved
Cover image for From DevOps to DevSecOps: How Secure Software Development Evolved

From DevOps to DevSecOps: How Secure Software Development Evolved

Comments
5 min read
DevSecOps Pipeline Security: Automation and Continuous Monitoring

DevSecOps Pipeline Security: Automation and Continuous Monitoring

1
Comments
3 min read
I Analyzed 47 DevSecOps Job Postings - Here's What Companies Actually Want
Cover image for I Analyzed 47 DevSecOps Job Postings - Here's What Companies Actually Want

I Analyzed 47 DevSecOps Job Postings - Here's What Companies Actually Want

12
Comments 6
6 min read
Think You’re Secure? Penetration Testing Will Tell You the Truth
Cover image for Think You’re Secure? Penetration Testing Will Tell You the Truth

Think You’re Secure? Penetration Testing Will Tell You the Truth

44
Comments
6 min read
AWS Security: KMS Keys
Cover image for AWS Security: KMS Keys

AWS Security: KMS Keys

1
Comments
2 min read
loading...