Articles by Tag #devsecops

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

DevOps Made Simple: A Beginner’s Guide to DevSecOps in Action - Securing Your CI/CD Pipeline

Introduction As DevOps continues to revolutionize software development, security has...

Learn More 32 2Mar 22

Secure Drupal: Best Practices for Enterprise Sites

“Small habits, when repeated daily, become big results.” - James Clear, author of Atomic...

Learn More 31 0Aug 4

Understanding DevSecOps Principles

_DevSecOps is the integration of security practices into DevOps workflows. It ensures that security...

Learn More 29 0Dec 19 '24

Understanding command injection vulnerabilities in Go

Read how command injection works and the dangers it poses. Learn about practical guidance on how to prevent it. By following best practices and using tools like Snyk, you can significantly reduce the risk of command injection attacks in your Go projects.

Learn More 13 2Nov 15 '24

Automate Uploading Security Scan Results to DefectDojo

In my previous blog, I explored secret scanning in CI pipelines using Gitleaks and pre-commit hooks....

Learn More 13 0Sep 15 '24

8 GitHub-Starred Security Projects You Shouldn’t Miss in 2025

Whether you're a DevSecOps engineer, pentester, or just a curious developer — staying ahead in...

Learn More 12 1May 21

DevSecOps: Integrating Security into Your CI/CD Pipeline

Introduction: Why Security Matters in DevOps Imagine launching a new application with a...

Learn More 11 0Mar 9

About Me – DevOps & DevSecOps Engineer

Hey there! I'm Kishore Kumar, a DevOps & DevSecOps Engineer with 5 years of experience in the IT...

Learn More 11 2Mar 27

3-Minute Setup: The Open Source WAF That’s Taking Over GitHub

Looking for a Web Application Firewall (WAF) that actually works — and doesn't take hours to...

Learn More 10 1May 20

SafeLine WAF: The Open-Source Web Firewall That’s Winning Devs Over

Protect your website in just 3 minutes—with zero configuration rules and near-zero false...

Learn More 10 0May 6

DevSecOps Fundamentals: Security in the Jenkins Pipeline

In today’s rapidly evolving software development landscape, speed is crucial. However, speed without...

Learn More 9 0Oct 6 '24

Building a Netflix Clone with DevSecOps: A Complete DevSecOps Project.

Introduction In today’s rapidly evolving cloud landscape, DevSecOps is no longer optional...

Learn More 7 1Jul 13

Deconstructing DevSecOps

As a an engineer that has worked in multiple fields I have seen many approaches to handle the...

Learn More 6 0Dec 26 '24

7 Kubernetes Security Best Practices in 2024

Kubernetes (K8S) has revolutionized software development, but managing such a complex system with...

Learn More 6 0Oct 29 '24

Why We Chose SafeLine WAF for Our CTF Challenge Environment

During a recent Capture The Flag (CTF) competition focused on incident response, one question kept...

Learn More 6 0May 9

Real-Time Threat Modeling with AI? This Open-Source WAF Does It.

1. Introduction Cyberattacks are becoming a daily occurrence—is your web app still...

Learn More 5 0May 16

Enhance your Code Security with Amazon Inspector

As a latest addition to the vulnerability scanning capabilities of Amazon Inspector across multiple...

Learn More 5 1Jul 27

Deploying SafeLine WAF on CentOS: Online First, Then Offline

This guide demonstrates how to deploy SafeLine WAF on CentOS 7 using an online setup first, followed...

Learn More 5 0Jun 12

Turn Off Vulnerability Scanners with SafeLine WAF: Anti-Scan, Semantic Engine & One-Line Deployment

SafeLine’s not just about blocking known threats — it actively breaks scanner logic, defends...

Learn More 5 0May 14

OWASP Top 10 Is Just the Start: How WAFs Defend Against Real Attacks

If you've ever read the OWASP Top 10, you already know the most common web vulnerabilities—like SQL...

Learn More 5 0Jun 12

Build a Full Web Security Wall from Scratch — What Can SafeLine WAF Do?

In today’s digital-first world, cybersecurity isn’t just a bonus — it’s mission-critical. Especially...

Learn More 5 0May 29

DevOps vs DevSecOps

Do you know the difference between DevOps and DevSecOps? DevOps focuses on streamlining the...

Learn More 4 1Apr 7

🚀 Pulumi AWS Provider 7.0: Multi-Region AWS IaC & IAM Role Chaining

Pulumi AWS Provider 7.0 is here, bringing major enhancements to AWS infrastructure as code...

Learn More 4 0Aug 12

Implement CIS Top 18 Controls in Your Organization

Introduction to Center of Internet Security(CIS) The CIS Critical Security Controls (CSCs)...

Learn More 4 0Sep 7 '24

10 Docker Security Best Practices

Understand the basics of Docker security best practices with our Docker Cheat Sheet to improve container security.

Learn More 4 0Jan 9

The Future of DevSecOps: Enhancing Your Software Security Development with NIST Guidelines

Introduction In the fast-paced world of software development, staying ahead of security...

Learn More 3 0Sep 21 '24

Docker Scout: Your Container Security Companion - A Developer's Guide

Hey there, fellow developers! If you've been in the containerization space lately, you might have...

Learn More 3 1Jan 16

Platform Engineering 101: Build Faster, Ship Safer

It's 3 AM. Your phone buzzes with yet another production alert. As you groggily SSH into servers...

Learn More 3 1May 19

El Astrónomo que Derrotó a un Hacker 🚨💻

Introducción En los años 80, cuando internet aún estaba en pañales, Cliff Stoll, un...

Learn More 3 1Jan 26

Implementing Blue-Green Deployment in Kubernetes with TLS Encryption Using Cert-Manager and Nginx Ingress

Introduction 🌟 In modern cloud-native environments, ensuring zero-downtime deployments...

Learn More 3 0Nov 15 '24