DEV Community

# devsecops

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Securing Your Code with GitHub

Securing Your Code with GitHub

36
Comments 1
7 min read
Vulnerabilidade de Software Para Devs

Vulnerabilidade de Software Para Devs

35
Comments 1
4 min read
Yet another rant in favor of Kubernetes Secrets

Yet another rant in favor of Kubernetes Secrets

30
Comments 2
12 min read
DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 1

DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 1

26
Comments 1
6 min read
Codificação segura, por que todos devs precisam conhecer?

Codificação segura, por que todos devs precisam conhecer?

16
Comments 3
2 min read
The Future of DevSecOps with the CloudBees Platform—An In-Depth Look

The Future of DevSecOps with the CloudBees Platform—An In-Depth Look

15
Comments
4 min read
DevSecOps with AWS- IaC at scale - Getting started.

DevSecOps with AWS- IaC at scale - Getting started.

12
Comments
9 min read
Role-based Access Control in Golang with jwt-go

Role-based Access Control in Golang with jwt-go

11
Comments 8
7 min read
Docker Security: Clair

Docker Security: Clair

7
Comments
6 min read
OWASP API7:2023 Server Side Request Forgery(SSRF)

OWASP API7:2023 Server Side Request Forgery(SSRF)

7
Comments
3 min read
OWASP API2:2023 Broken Authentication 🚫🔐

OWASP API2:2023 Broken Authentication 🚫🔐

6
Comments
4 min read
Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

Simplifying Cybersecurity: Key Principles for a Robust Defense 🌐

6
Comments
4 min read
Tips and tricks for Backstage Software Templates

Tips and tricks for Backstage Software Templates

6
Comments
4 min read
Level-Up Your AWS CDK Game: Shift Left Security Unveiled!

Level-Up Your AWS CDK Game: Shift Left Security Unveiled!

6
Comments 4
12 min read
OWASP API9:2023 Improper Inventory Management 📊🛠️🚨

OWASP API9:2023 Improper Inventory Management 📊🛠️🚨

6
Comments
3 min read
A Deep Dive into OCSF & VEX - Unified Standards for Security Management

A Deep Dive into OCSF & VEX - Unified Standards for Security Management

6
Comments
6 min read
Dominando las pruebas en DevOps: Una guĂ­a exhaustiva de tipos y tĂŠcnicas

Dominando las pruebas en DevOps: Una guĂ­a exhaustiva de tipos y tĂŠcnicas

6
Comments
3 min read
Kickstarting Your DevSecOps Career - The 4 Essential Certifications You Need

Kickstarting Your DevSecOps Career - The 4 Essential Certifications You Need

6
Comments
5 min read
GitHub RepoJacking: Are You Sure Your GitHub Is Safe?

GitHub RepoJacking: Are You Sure Your GitHub Is Safe?

6
Comments 1
7 min read
Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

Introducing OWASP: A Comprehensive Exploration of Web Application Security 🌐🔒

6
Comments 3
4 min read
OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

OWASP API3:2023 Broken Object Property Level Authorization 💔🔑🛠️

5
Comments
5 min read
OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

OWASP API5:2023 Broken Function Level Authorization 🔐👤💔

5
Comments
4 min read
GitHub Security Best Practices – 15 Tips To Keep In Mind

GitHub Security Best Practices – 15 Tips To Keep In Mind

5
Comments
11 min read
OWASP API10:2023 Unsafe Consumption of APIs

OWASP API10:2023 Unsafe Consumption of APIs

5
Comments
3 min read
OWASP API8:2023 Security Misconfiguration 🔐🚨

OWASP API8:2023 Security Misconfiguration 🔐🚨

5
Comments
3 min read
Securing Your Applications on AWS: Guide to Data Privacy and Protection

Securing Your Applications on AWS: Guide to Data Privacy and Protection

5
Comments
3 min read
OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

OWASP API4:2023 Unrestricted Resource Consumption ⚠️🔄🚨

4
Comments
4 min read
OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

OWASP API1:2023 Broken Object Level Authorization (BOLA) 🔒💔

4
Comments
5 min read
DevSecOps with AWS- IaC at scale - Building your own platform - Part 1

DevSecOps with AWS- IaC at scale - Building your own platform - Part 1

4
Comments
6 min read
DevSecOps with AWS – ChatOps with AWS and AWS Developer Tools – Part 2

DevSecOps with AWS – ChatOps with AWS and AWS Developer Tools – Part 2

4
Comments
8 min read
DevOps vs DevSecOps: The Debate

DevOps vs DevSecOps: The Debate

3
Comments
10 min read
How to update cURL

How to update cURL

3
Comments
8 min read
How can we integrate security into the DevOps pipelines?

How can we integrate security into the DevOps pipelines?

3
Comments
7 min read
10 GitHub Security Best Practices

10 GitHub Security Best Practices

3
Comments
14 min read
Top 8 penetration testing tools

Top 8 penetration testing tools

3
Comments 1
5 min read
DevSecOps: Orchestrating Secure and Observable 3-Tier Deployments on AWS with Terraform, EKS, Jenkins, Prometheus etc.

DevSecOps: Orchestrating Secure and Observable 3-Tier Deployments on AWS with Terraform, EKS, Jenkins, Prometheus etc.

3
Comments
19 min read
Exploring the World of SAST and DAST with a DevSecOps Twist

Exploring the World of SAST and DAST with a DevSecOps Twist

3
Comments
4 min read
Best practices for effective attack surface analysis

Best practices for effective attack surface analysis

3
Comments
7 min read
DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 2

DevSecOps with AWS- Ephemeral Environments – Creating test Environments On-Demand - Part 2

3
Comments
7 min read
How to strengthen security in your CI/CD pipeline

How to strengthen security in your CI/CD pipeline

3
Comments
8 min read
Designing Security Workflows using Gitlab CI Templates

Designing Security Workflows using Gitlab CI Templates

3
Comments
5 min read
A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

A Refreshing Take on DevSecOps: My Insights from Tanya Janca's OWASP London Talk

3
Comments
2 min read
OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

OWASP API6:2023 Unrestricted Access to Sensitive Business Flows 🔐👤💔

2
Comments
3 min read
Integrating Cybersecurity into AI Software Development on Kubernetes: Key Takeaways from Andrew Martin

Integrating Cybersecurity into AI Software Development on Kubernetes: Key Takeaways from Andrew Martin

2
Comments
3 min read
CloudBees Security Insights Overview

CloudBees Security Insights Overview

2
Comments
8 min read
How to use IAST to prove exploitable vulnerabilities within your first-party code

How to use IAST to prove exploitable vulnerabilities within your first-party code

2
Comments
10 min read
Common SAML vulnerabilities and how to remediate them

Common SAML vulnerabilities and how to remediate them

2
Comments 1
4 min read
Let's Play Snyk 🐶

Let's Play Snyk 🐶

2
Comments 4
5 min read
8 tips for securing your CI/CD pipeline with Snyk

8 tips for securing your CI/CD pipeline with Snyk

2
Comments
17 min read
Protecting Your Codebase: How to Identify and Mitigate SAST Vulnerabilities

Protecting Your Codebase: How to Identify and Mitigate SAST Vulnerabilities

2
Comments
5 min read
DevOps vs DevSecOps

DevOps vs DevSecOps

2
Comments 2
2 min read
Building a security-conscious CI/CD pipeline

Building a security-conscious CI/CD pipeline

2
Comments
7 min read
Aplicando uma estratĂŠgia DevSecOps com Veracode e GitFlow

Aplicando uma estratĂŠgia DevSecOps com Veracode e GitFlow

1
Comments
4 min read
Platform Engineering and Security: A Very Short Introduction

Platform Engineering and Security: A Very Short Introduction

1
Comments
6 min read
Configurando o agente DAST ISM Veracode em servidores Linux

Configurando o agente DAST ISM Veracode em servidores Linux

1
Comments
3 min read
GitHub Recovery Code

GitHub Recovery Code

1
Comments
4 min read
Amazon Security Lake: Centralized Data Management for Modern DevSecOps Toolchains

Amazon Security Lake: Centralized Data Management for Modern DevSecOps Toolchains

1
Comments
8 min read
The importance of platform engineers in a security program

The importance of platform engineers in a security program

1
Comments
4 min read
Getting Started with DevSecOps: An Introduction to CNAPP

Getting Started with DevSecOps: An Introduction to CNAPP

1
Comments
6 min read
A day in the life of an ethical hacker

A day in the life of an ethical hacker

1
Comments
10 min read
loading...