Articles by Tag #devsecops

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Best Practices for Using GitHub Secrets - Part 1

Best Practices for Managing Sensitive Information in a GitHub Workflow

Learn More 33 0Jul 18 '24

DevOps Made Simple: A Beginner’s Guide to DevSecOps in Action - Securing Your CI/CD Pipeline

Introduction As DevOps continues to revolutionize software development, security has...

Learn More 32 2Mar 22

Understanding DevSecOps Principles

_DevSecOps is the integration of security practices into DevOps workflows. It ensures that security...

Learn More 29 0Dec 19 '24

Secret Scanning in CI pipelines using Gitleaks and Pre-commit Hook.

In today's development environment, maintaining the security of your code is as crucial as ensuring...

Learn More 22 0Jul 16 '24

Understanding command injection vulnerabilities in Go

Read how command injection works and the dangers it poses. Learn about practical guidance on how to prevent it. By following best practices and using tools like Snyk, you can significantly reduce the risk of command injection attacks in your Go projects.

Learn More 13 2Nov 15 '24

Automate Uploading Security Scan Results to DefectDojo

In my previous blog, I explored secret scanning in CI pipelines using Gitleaks and pre-commit hooks....

Learn More 13 0Sep 15 '24

DevSecOps: Integrating Security into Your CI/CD Pipeline

Introduction: Why Security Matters in DevOps Imagine launching a new application with a...

Learn More 11 0Mar 9

About Me – DevOps & DevSecOps Engineer

Hey there! I'm Kishore Kumar, a DevOps & DevSecOps Engineer with 5 years of experience in the IT...

Learn More 11 2Mar 27

8 GitHub-Starred Security Projects You Shouldn’t Miss in 2025

Whether you're a DevSecOps engineer, pentester, or just a curious developer — staying ahead in...

Learn More 11 1May 21

Integrating Azure Key Vault for Secrets with GitHub Action Workflows - Part 2

Best Practices for Managing Sensitive Information in a GitHub Workflow

Learn More 10 0Jul 31 '24

3-Minute Setup: The Open Source WAF That’s Taking Over GitHub

Looking for a Web Application Firewall (WAF) that actually works — and doesn't take hours to...

Learn More 10 1May 20

SafeLine WAF: The Open-Source Web Firewall That’s Winning Devs Over

Protect your website in just 3 minutes—with zero configuration rules and near-zero false...

Learn More 10 0May 6

DevSecOps Fundamentals: Security in the Jenkins Pipeline

In today’s rapidly evolving software development landscape, speed is crucial. However, speed without...

Learn More 8 0Oct 6 '24

Contributing Minder to the OpenSSF, out of a deep belief in the power of the open source community

I’m excited to announce that Stacklok is contributing our Minder open source project to the Open...

Learn More 7 0Nov 4 '24

Turn Off Vulnerability Scanners with SafeLine WAF: Anti-Scan, Semantic Engine & One-Line Deployment

SafeLine’s not just about blocking known threats — it actively breaks scanner logic, defends...

Learn More 7 0May 14

7 Kubernetes Security Best Practices in 2024

Kubernetes (K8S) has revolutionized software development, but managing such a complex system with...

Learn More 6 0Oct 29 '24

Why We Chose SafeLine WAF for Our CTF Challenge Environment

During a recent Capture The Flag (CTF) competition focused on incident response, one question kept...

Learn More 6 0May 9

Deconstructing DevSecOps

As a an engineer that has worked in multiple fields I have seen many approaches to handle the...

Learn More 6 0Dec 26 '24

Build a Full Web Security Wall from Scratch — What Can SafeLine WAF Do?

In today’s digital-first world, cybersecurity isn’t just a bonus — it’s mission-critical. Especially...

Learn More 5 0May 29

Deploying SafeLine WAF on CentOS: Online First, Then Offline

This guide demonstrates how to deploy SafeLine WAF on CentOS 7 using an online setup first, followed...

Learn More 5 0Jun 12

Real-Time Threat Modeling with AI? This Open-Source WAF Does It.

1. Introduction Cyberattacks are becoming a daily occurrence—is your web app still...

Learn More 5 0May 16

OWASP Top 10 Is Just the Start: How WAFs Defend Against Real Attacks

If you've ever read the OWASP Top 10, you already know the most common web vulnerabilities—like SQL...

Learn More 5 0Jun 12

DevOps vs DevSecOps

Do you know the difference between DevOps and DevSecOps? DevOps focuses on streamlining the...

Learn More 4 1Apr 7

10 Docker Security Best Practices

Understand the basics of Docker security best practices with our Docker Cheat Sheet to improve container security.

Learn More 4 0Jan 9

Implement CIS Top 18 Controls in Your Organization

Introduction to Center of Internet Security(CIS) The CIS Critical Security Controls (CSCs)...

Learn More 4 0Sep 7 '24

Platform Engineering 101: Build Faster, Ship Safer

It's 3 AM. Your phone buzzes with yet another production alert. As you groggily SSH into servers...

Learn More 4 1May 19

Free Virtual Masterclass

Join our free virtual masterclass on How AI Solves the Kubernetes Complexity Challenge. Register...

Learn More 4 1Jul 6 '24

Docker Scout: Your Container Security Companion - A Developer's Guide

Hey there, fellow developers! If you've been in the containerization space lately, you might have...

Learn More 3 1Jan 16

The Future of DevSecOps: Enhancing Your Software Security Development with NIST Guidelines

Introduction In the fast-paced world of software development, staying ahead of security...

Learn More 3 0Sep 21 '24

Implementing Blue-Green Deployment in Kubernetes with TLS Encryption Using Cert-Manager and Nginx Ingress

Introduction 🌟 In modern cloud-native environments, ensuring zero-downtime deployments...

Learn More 3 0Nov 15 '24