DEV Community

yayabobi profile picture

yayabobi

404 bio not found

Joined Joined on  twitter website
Top 17 Best Unit Testing Tools

Top 17 Best Unit Testing Tools

Comments
8 min read
ISO 42001: What Is It, and 7 Steps to Comply

ISO 42001: What Is It, and 7 Steps to Comply

Comments
9 min read
Top 12 DevSecOps Tools for 2025

Top 12 DevSecOps Tools for 2025

5
Comments
10 min read
6 Steps to Run API Automation Testing

6 Steps to Run API Automation Testing

2
Comments
6 min read
The Essential NIST 800-171 Compliance Checklist

The Essential NIST 800-171 Compliance Checklist

Comments
8 min read
7 Ways to Use the SLSA Framework to Secure the SDLC

7 Ways to Use the SLSA Framework to Secure the SDLC

Comments
8 min read
The Essential Business Continuity Plan Template [DOC]

The Essential Business Continuity Plan Template [DOC]

1
Comments
7 min read
SSDLC: 7 Steps to Create a Secure Software Supply Chain

SSDLC: 7 Steps to Create a Secure Software Supply Chain

Comments
7 min read
Top 10 MLOps Tools for 2025

Top 10 MLOps Tools for 2025

Comments
8 min read
The DevOps Guide to WAF API Gateways

The DevOps Guide to WAF API Gateways

Comments
8 min read
OWASP Cheat Sheet for SDLC with Downloadable [XLS]

OWASP Cheat Sheet for SDLC with Downloadable [XLS]

1
Comments
8 min read
Top 10 Code Security Tools

Top 10 Code Security Tools

10
Comments
10 min read
6 Best Practices for Performing a Fraud Risk Assessment

6 Best Practices for Performing a Fraud Risk Assessment

Comments
6 min read
6 Workflow Automation Examples You Can Create in Minutes

6 Workflow Automation Examples You Can Create in Minutes

Comments
7 min read
A Step-by-Step Guide to Running a SAST Test

A Step-by-Step Guide to Running a SAST Test

1
Comments
7 min read
Top 10 SBOM Tools to Inventory Your App Components

Top 10 SBOM Tools to Inventory Your App Components

Comments
7 min read
Top 12 Developer Productivity Tools

Top 12 Developer Productivity Tools

Comments
8 min read
6 Use Cases for Low-Code Process Automation

6 Use Cases for Low-Code Process Automation

Comments
7 min read
7 Best Practices for Container Security

7 Best Practices for Container Security

Comments
6 min read
10 GCP Security Best Practices for Busy DevOps

10 GCP Security Best Practices for Busy DevOps

Comments
7 min read
Top 8 Process Automation Solutions

Top 8 Process Automation Solutions

1
Comments
8 min read
What is Web Development? A Comprehensive Guide

What is Web Development? A Comprehensive Guide

Comments
13 min read
Top 11 DevOps Security Tools

Top 11 DevOps Security Tools

1
Comments
9 min read
Top Web Development Trends You Need to Know in 2024 & Beyond

Top Web Development Trends You Need to Know in 2024 & Beyond

Comments
10 min read
Top 10 Infrastructure as Code Tools

Top 10 Infrastructure as Code Tools

1
Comments
9 min read
IT Process Automation: What is it and How Does GenAI Impact it?

IT Process Automation: What is it and How Does GenAI Impact it?

Comments
6 min read
7 Essential Tips for Improving Operational Efficiency in Healthcare

7 Essential Tips for Improving Operational Efficiency in Healthcare

Comments
6 min read
5 Use Cases for Using Open Policy Agent

5 Use Cases for Using Open Policy Agent

Comments
7 min read
How to Use Legitify to Detect Misconfigurations

How to Use Legitify to Detect Misconfigurations

1
Comments
6 min read
A Developer’s Guide to Digital Process Automation

A Developer’s Guide to Digital Process Automation

Comments
5 min read
What are Risk Engines, and How to Make Sure They Work Well

What are Risk Engines, and How to Make Sure They Work Well

Comments
10 min read
Fraud Risk Assessment: 5 Essentials Every Plan Must Have

Fraud Risk Assessment: 5 Essentials Every Plan Must Have

Comments
6 min read
How to Harden IaC Security with KICS

How to Harden IaC Security with KICS

Comments
6 min read
How to Harden IaC Security with KICS

How to Harden IaC Security with KICS

Comments
6 min read
The Easy-to-use Incident Response Policy Template

The Easy-to-use Incident Response Policy Template

Comments
7 min read
10 Examples of Cyber-Physical Systems

10 Examples of Cyber-Physical Systems

Comments
9 min read
5 Types of Clone Phishing Attacks and Best Protection Strategies

5 Types of Clone Phishing Attacks and Best Protection Strategies

Comments
13 min read
What is a vCISO Platform and Where Should You Start?

What is a vCISO Platform and Where Should You Start?

Comments
6 min read
The Crucial Risk Assessment Template for Cybersecurity

The Crucial Risk Assessment Template for Cybersecurity

Comments
7 min read
7 Ways to Improve Asset Visibility

7 Ways to Improve Asset Visibility

Comments
7 min read
How to Select the Right Data Discovery Tool for Your Requirements

How to Select the Right Data Discovery Tool for Your Requirements

Comments
8 min read
Workday Security: Everything You Need to Know

Workday Security: Everything You Need to Know

1
Comments
7 min read
Cloud Application Security – Top Threats and Best Practices

Cloud Application Security – Top Threats and Best Practices

Comments
7 min read
8 Essential Components Every Dynamic Risk Assessment Must Have

8 Essential Components Every Dynamic Risk Assessment Must Have

Comments
7 min read
9 Tips to Correctly Understand and Configure IAM on GCP

9 Tips to Correctly Understand and Configure IAM on GCP

2
Comments
7 min read
9 Tips to Correctly Understand and Configure IAM on GCP

9 Tips to Correctly Understand and Configure IAM on GCP

Comments
7 min read
IIoT Security: 5 Essential Steps to Secure your IoT Devices and OS

IIoT Security: 5 Essential Steps to Secure your IoT Devices and OS

1
Comments
6 min read
Serverless Security Best Practices

Serverless Security Best Practices

1
Comments
9 min read
7 Reasons to Adopt a Distributed Cloud Infrastructure

7 Reasons to Adopt a Distributed Cloud Infrastructure

Comments
8 min read
5 Steps to Building a Robust Cyber Resilience Framework

5 Steps to Building a Robust Cyber Resilience Framework

Comments
8 min read
4 Tips to Improve P99 Latency

4 Tips to Improve P99 Latency

Comments
7 min read
A Step-by-Step Guide to Creating a Data Security Policy

A Step-by-Step Guide to Creating a Data Security Policy

1
Comments 2
6 min read
The Developer's Guide to OWASP API Security

The Developer's Guide to OWASP API Security

1
Comments
9 min read
14 Cybersecurity Awareness Topics You Need to Cover

14 Cybersecurity Awareness Topics You Need to Cover

Comments
7 min read
7 Essential SaaS Security Best Practices

7 Essential SaaS Security Best Practices

1
Comments
7 min read
What is Identity Governance: 5 Steps to Build Your Framework

What is Identity Governance: 5 Steps to Build Your Framework

Comments
6 min read
HIPAA and Privacy Act Training Challenge Exam [XLS download]

HIPAA and Privacy Act Training Challenge Exam [XLS download]

Comments
8 min read
A Step-by-Step Guide to Creating an AWS IAM Policy Document

A Step-by-Step Guide to Creating an AWS IAM Policy Document

1
Comments
6 min read
The Essential Guide to Internal Developer Platforms

The Essential Guide to Internal Developer Platforms

Comments
7 min read
What is API Discovery, and How to Use it to Reduce Your Attack Surface

What is API Discovery, and How to Use it to Reduce Your Attack Surface

Comments
8 min read
loading...