Articles by Tag #devsecops

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

Mastering Version Control with Git: Beyond the Basics

_Welcome Aboard Week 2 of DevSecOps in 5: Your Ticket to Secure Development Superpowers! Hey there,...

Learn More 292 1Jun 14 '24

Advanced CI/CD Pipeline Configuration Strategies

_Welcome Aboard Week 3 of DevSecOps in 5: Your Ticket to Secure Development Superpowers! Hey there,...

Learn More 142 13Jun 19 '24

What is DevSecOps? A Comprehensive Look at DevSecOps

Welcome Aboard Week 1 of DevSecOps in 5: Your Ticket to Secure Development Superpowers! _Hey there,...

Learn More 101 4Jun 3 '24

Building a Secure CI/CD Pipeline: Beyond the Basics of Security Testing

_Welcome Aboard Week 3 of DevSecOps in 5: Your Ticket to Secure Development Superpowers! Hey there,...

Learn More 52 0Jun 21 '24

DevOps Made Simple: A Beginner’s Guide to DevSecOps in Action - Securing Your CI/CD Pipeline

Introduction As DevOps continues to revolutionize software development, security has...

Learn More 32 2Mar 22

Understanding DevSecOps Principles

_DevSecOps is the integration of security practices into DevOps workflows. It ensures that security...

Learn More 29 0Dec 19 '24

Best Practices for Using GitHub Secrets - Part 1

Best Practices for Managing Sensitive Information in a GitHub Workflow

Learn More 29 0Jul 18 '24

Secret Scanning in CI pipelines using Gitleaks and Pre-commit Hook.

In today's development environment, maintaining the security of your code is as crucial as ensuring...

Learn More 21 0Jul 16 '24

Building a Fort Knox DevSecOps: Comprehensive Security Practices

_Welcome Aboard Week 2 of DevSecOps in 5: Your Ticket to Secure Development Superpowers! Hey there,...

Learn More 21 0Jun 12 '24

Building a Rock-Solid Foundation with Infrastructure as Code (IaC)

_Welcome Aboard Week 3 of DevSecOps in 5: Your Ticket to Secure Development Superpowers! Hey there,...

Learn More 19 1Jun 17 '24

Cloud-Native Security: A Guide to Microservices and Serverless Protection

Welcome Aboard Week 1 of DevSecOps in 5: Your Ticket to Secure Development Superpowers! _Hey there,...

Learn More 16 1Jun 5 '24

Understanding command injection vulnerabilities in Go

Read how command injection works and the dangers it poses. Learn about practical guidance on how to prevent it. By following best practices and using tools like Snyk, you can significantly reduce the risk of command injection attacks in your Go projects.

Learn More 13 2Nov 15 '24

Automate Uploading Security Scan Results to DefectDojo

In my previous blog, I explored secret scanning in CI pipelines using Gitleaks and pre-commit hooks....

Learn More 12 0Sep 15 '24

Zero Trust Security: Beyond the Castle Walls

Welcome Aboard Week 1 of DevSecOps in 5: Your Ticket to Secure Development Superpowers! _Hey there,...

Learn More 12 0Jun 7 '24

About Me – DevOps & DevSecOps Engineer

Hey there! I'm Kishore Kumar, a DevOps & DevSecOps Engineer with 5 years of experience in the IT...

Learn More 11 2Mar 27

DevSecOps: Integrating Security into Your CI/CD Pipeline

Introduction: Why Security Matters in DevOps Imagine launching a new application with a...

Learn More 11 0Mar 9

Integrating Azure Key Vault for Secrets with GitHub Action Workflows - Part 2

Best Practices for Managing Sensitive Information in a GitHub Workflow

Learn More 9 0Jul 31 '24

Network Policy in Kubernetes

Secure communication between pods is critical in maintaining secure deployments. In this post, I will...

Learn More 8 1Jun 2 '24

Contributing Minder to the OpenSSF, out of a deep belief in the power of the open source community

I’m excited to announce that Stacklok is contributing our Minder open source project to the Open...

Learn More 7 0Nov 4 '24

DevSecOps Fundamentals: Security in the Jenkins Pipeline

In today’s rapidly evolving software development landscape, speed is crucial. However, speed without...

Learn More 7 0Oct 6 '24

Deconstructing DevSecOps

As a an engineer that has worked in multiple fields I have seen many approaches to handle the...

Learn More 6 0Dec 26 '24

Docker Security Checklist: Are You Production Ready?

Secure Docker images for production with this essential guide. Learn how to scan for vulnerabilities, use multi-stage builds, avoid embedded secrets, and ensure smooth container deployments

Learn More 6 0Jun 25 '24

7 Kubernetes Security Best Practices in 2024

Kubernetes (K8S) has revolutionized software development, but managing such a complex system with...

Learn More 6 0Oct 29 '24

How You Can Use Logs to Feed Security

If your system is facing an imminent security threat — or worse, you’ve just suffered a breach — then...

Learn More 5 0May 13 '24

DevOps vs DevSecOps

Do you know the difference between DevOps and DevSecOps? DevOps focuses on streamlining the...

Learn More 4 0Apr 7

10 Docker Security Best Practices

Understand the basics of Docker security best practices with our Docker Cheat Sheet to improve container security.

Learn More 4 0Jan 9

Free Virtual Masterclass

Join our free virtual masterclass on How AI Solves the Kubernetes Complexity Challenge. Register...

Learn More 4 1Jul 6 '24

Implement CIS Top 18 Controls in Your Organization

Introduction to Center of Internet Security(CIS) The CIS Critical Security Controls (CSCs)...

Learn More 4 0Sep 7 '24

Set up FreeIPA Server & Client.

In this guide, we'll set up a FreeIPA server and client on AWS EC2 instances using CentOS 9,...

Learn More 3 0May 9 '24

The Future of DevSecOps: Enhancing Your Software Security Development with NIST Guidelines

Introduction In the fast-paced world of software development, staying ahead of security...

Learn More 3 0Sep 21 '24