DevOps.com

  • Latest
    • Articles
    • Features
    • Most Read
    • News
    • News Releases
  • Topics
    • AI
    • Continuous Delivery
    • Continuous Testing
    • Cloud
    • Culture
    • DevSecOps
    • Enterprise DevOps
    • Leadership Suite
    • DevOps Practice
    • ROELBOB
    • DevOps Toolbox
    • IT as Code
  • Videos/Podcasts
    • DevOps Chats
    • DevOps Unbound
  • Webinars
    • Upcoming
    • On-Demand Webinars
  • Library
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Communities
    • AWS Community Hub
    • CloudBees
    • IT as Code
    • Rocket on DevOps.com
    • Traceable on DevOps.com
    • Quali on DevOps.com
  • Related Sites
    • Techstrong Group
    • Container Journal
    • Security Boulevard
    • Techstrong Research
    • DevOps Chat
    • DevOps Dozen
    • DevOps TV
    • Digital Anarchist
  • Media Kit
  • About
  • AI
  • Cloud
  • Continuous Delivery
  • Continuous Testing
  • DevSecOps
  • Leadership Suite
  • Practices
  • ROELBOB
  • Low-Code/No-Code
  • IT as Code
  • More
    • Application Performance Management/Monitoring
    • Culture
    • Enterprise DevOps

DevSecOps

DevSecOps Failure

Why Your DevSecOps Initiative Will Fail

Mike Rothman | July 5, 2022 | culture, DevOps Connect: DevSecOps Days Virtual Summit, devops culture, devsecops
When you’ve been in and around the security industry for long enough, you get used to the industry hype machine turning a cool innovation into, uh, meh. This hype cycle starts at ...
Rust in Linux 5.20 | Deepfake Hiring Fraud | IBM WFH ‘New Normal’

Rust in Linux 5.20 | Deepfake Hiring Fraud | IBM WFH ‘New Normal’

Richi Jennings | June 30, 2022 | ageism, careers, cloud and mainframe, Deepfake, Great Resignation, ibm, If we are true to ourselves we can not be false to anyone, linux, remote working, Rust, The Long View, working from home
In this week’s The Long View: Linus says next release will support Rust, FBI warns scammers are getting hired in deepfake interviews, and 80% of IBM staff stay at home ...
vulnerabilities security Pulumi DevSecOps Analyzing Code for Security Vulnerabilities

The Two Types of Code Vulnerabilities

Casey Bisson | June 30, 2022 | application security, code vulnerabilities, custom software development, devsecops
Spell checkers, grammar checkers and predictive keyboards all help reduce errors in written communication, but in a creative medium where writers need to innovate new expressions, nothing can eliminate all errors. The ...
GitLab value Argo Atlassian database Sqlcommenter flow metrics VSM low-code PostgreSQL database JSON

GitLab To Embed Observability in CI/CD Platform

Mike Vizard | June 29, 2022 | CI/CD, gitlab, observability, Software Supply Chain Security
The latest version of the GitLab continuous integration/continuous delivery (CI/CD) platform added a range of monitoring and visualization capabilities as part of an effort to embed a full set of observability capabilities ...
RDS data privacy risk DevSecOps Managing Data - data privacy -data security -data protection - compliance - cybersecurity - Imperva - risk management

Common RDS Misconfigurations DevSecOps Teams Should Know

Gad Rosenthal | June 29, 2022 | authentication, devsecops, misconfigurations, RDS, relational database
Relational databases have become the option of choice for organizations wishing to streamline and scale the use, storage and retrieval of data. Many organizations choose AWS Relational Database Service (RDS) to forego ...
DevSecOps learning DevOps

Quick! Define DevSecOps: Let’s Call it Development Security

Don Macvittie | June 29, 2022 | Agile Security, DAST, devsecops, IAST, SAST, Security scanning
For a good long while, DevSecOps referred specifically to vendors like Veracode that did static application security scanning, dynamic application security scanning, software composition analysis and some form of runtime monitoring (usually ...
Hasura API Apollo GraphQL oneAPI

Hasura SDK Integrates GraphQL Platform With More Data Sources

Mike Vizard | June 28, 2022 | API, databases, GraphQL, Hasura
At its HasuraCon ’22 conference, Hasura today announced the early release of a software development kit (SDK) that extends the reach of its GraphQL platform to additional data sources. In addition, Hasura ...
IoT

Chip-to-Cloud IoT: A Step Toward Web3

Nahla Davies | June 28, 2022 | connected devices, devsecops, Internet of Things, IoT, secure code
During the first six months of 2021, IoT devices were breached 1.51 billion times, a significant increase from only 639 million breaches observed for the entirety of 2020. This problem can be ...
JOIN US! DevOps Connect: DevSecOps Virtual Summit, July 12

DevOps Connect: DevSecOps — Building a Modern Cybersecurity Practice

Veronica Haggar | June 27, 2022 | API security, DevOps Connect: DevSecOps, devsecops, open source, RSAC 2022, SBOMs, security regulations, Software Supply Chain Security
Malicious actors are constantly looking for new ways to gain access to sensitive data and corrupt systems. As software supply chain attacks are on the rise, security has become a top priority ...
Contrast Security secrets scan dynamic

ShiftLeft Report Reveals State of Application Security

Mike Vizard | June 23, 2022 | Apache Log4j, application security, application vulnerability, shift left, ShiftLeft
A report published today by automated application security testing platform ShiftLeft found only one in three applications has an attackable vulnerability. The report also found organizations that prioritized their remediation efforts based ...
supply chain

The Age of Software Supply Chain Disruption

Bill Doerrfeld | June 23, 2022 | devsecops, SBoM, Secure Software, supply chain
The software supply chain is swiftly becoming a widespread attack vector, and securing it is now in the spotlight. Software supply chain attacks have become a given in 2022, reports Darktrace. SolarWinds, ...
DevSecOps shift shifting testing left

At Some Point, We’ve Shifted Too Far Left

Don Macvittie | June 22, 2022 | devsecops, security, security testing, shift left, toolchain
Those of us involved in DevOps have a tendency to see the world with blinders on. It is rather easy to fall into the “If all you have is a hammer, everything ...
Show More Loading...

TechStrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Continuous Deployment
Monday, July 11, 2022 - 1:00 pm EDT
Using External Tables to Store and Query Data on MinIO With SQL Server 2022
Tuesday, July 12, 2022 - 11:00 am EDT
Goldilocks and the 3 Levels of Cardinality: Getting it Just Right
Tuesday, July 12, 2022 - 1:00 pm EDT

Latest from DevOps.com

Rust in Linux 5.20 | Deepfake Hiring Fraud | IBM WFH ‘New Normal’
June 30, 2022 | Richi Jennings
Moving From Lift-and-Shift to Cloud-Native
June 30, 2022 | Alexander Gallagher
The Two Types of Code Vulnerabilities
June 30, 2022 | Casey Bisson
Common RDS Misconfigurations DevSecOps Teams Should Know
June 29, 2022 | Gad Rosenthal
Quick! Define DevSecOps: Let’s Call it Development Security
June 29, 2022 | Don Macvittie

Get The Top Stories of the Week

  • View DevOps.com Privacy Policy
  • This field is for validation purposes and should be left unchanged.

Download Free eBook

Hybrid Cloud Security 101
New call-to-action

Most Read on DevOps.com

Rust in Linux 5.20 | Deepfake Hiring Fraud | IBM WFH ‘New No...
June 30, 2022 | Richi Jennings
The Two Types of Code Vulnerabilities
June 30, 2022 | Casey Bisson
Moving From Lift-and-Shift to Cloud-Native
June 30, 2022 | Alexander Gallagher
Common RDS Misconfigurations DevSecOps Teams Should Know
June 29, 2022 | Gad Rosenthal
Quick! Define DevSecOps: Let’s Call it Development Security
June 29, 2022 | Don Macvittie

On-Demand Webinars

DevOps.com Webinar ReplaysDevOps.com Webinar Replays
  • Home
  • About DevOps.com
  • Meet our Authors
  • Write for DevOps.com
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • Privacy Policy

Powered by Techstrong Group, Inc.

© 2022 ·Techstrong Group, Inc.All rights reserved.