#devsecops

[ follow ]
DevOps
fromfaun.pub
2 weeks ago

SBOM-Driven Deployments: Blocking Builds Without Verified Dependencies

Generate and enforce SBOMs in CI/CD to block risky dependencies and prevent supply chain breaches.
fromMedium
2 weeks ago

Cloud FinOps Meets DevSecOps: Money-First, Secure Always

Cloud costs are your canary in the coal mine - and a security signal too. Imagine you're staring at your cloud dashboard, and bam - a sudden spike in spending hits you. It's not just burning cash; it's waving a red flag for potential security holes. That unexplained surge in Kubernetes pods? Could be a sneaky cryptojacker. Or those idle EC2 instances racking up bills?
DevOps
Information security
fromMedium
1 week ago

From Jenkins to GitHub Actions: Evolving a Secure DevSecOps Pipeline with Canary Deployments

Migrate CI from Jenkins to GitHub Actions; strengthen secrets and security; adopt canary progressive delivery; use Ingress to expose applications for scalable DevSecOps pipelines.
Information security
fromDevOps.com
1 week ago

The DevSecOps Career Path: What No One Tells You About Getting Started - DevOps.com

DevOps teams must integrate security into every stage of rapid development, developing skills to balance delivery speed with robust threat-aware practices.
fromDevOps.com
2 weeks ago

Harness CEO Calls for Reimagining of CI/CD Workflows in the AI Era - DevOps.com

Rather than simply failing a build it's now possible for the CI/CD platform to automatically fix issues that previously required massive amounts of toil. For example, CI/CD platforms infused with AI can not only create a list of tasks that need to be completed to enable a build to run successfully, but it can now perform those tasks in the background while still keeping humans in the loop, he said.
Software development
Information security
fromDevOps.com
2 weeks ago

Oasis Security Identifies Security Weakness in Cursor AI Coding Tool - DevOps.com

Cursor AI disables Workspace Trust by default, allowing malicious repositories to potentially auto-execute code when opened unless mitigations are applied.
Information security
fromDevOps.com
3 weeks ago

What Makes Vulnerability Scanning Effective in Fast-Moving DevSecOps Pipelines Today? - DevOps.com

Effective vulnerability scanning must be fast, integrated into CI/CD, and prioritize quality to enable secure continuous delivery without blocking developer flow.
Information security
fromSecuritymagazine
3 weeks ago

The Top Threats Undermining the Security of Software Supply Chains

Rapidly evolving software supply chains increase complexity and vulnerabilities, forcing organizations to prioritize stronger tools and practices to manage exploding CVEs and third-party risks.
Information security
fromInfoWorld
1 month ago

8 vendors bringing AI to devsecops and application security

AI is becoming foundational to software security, enabling automated vulnerability remediation, real-time secure coding, and supply-chain hardening while introducing governance and risk challenges.
fromDevOps.com
1 month ago

Tackling the DevSecOps Gap in Software Understanding - DevOps.com

Let's dig into what this really means, why it matters, and where we go from here. But then I thought a bit more. It's not just necessary-it's overdue. And not only for national security systems. This gap in software understanding exists across nearly every enterprise and agency in the public and private sector. The real challenge is not recognizing the problem. It's addressing it early, systemically and sustainably-especially in a DevSecOps context.
DevOps
fromDevOps.com
1 month ago

White Paper: The Future of DevSecOps in a Fully Autonomous CI/CD Pipeline - DevOps.com

The growing complexity of modern software development and the increasing speed at which organizations need to deliver software have led to the widespread adoption of DevOps practices, particularly continuous integration/continuous deployment(CI/CD) pipelines. These pipelines enable rapid development and deployment cycles; however, they also introduce significant security risks that must be addressed continuously. The traditional methods of integrating security, including DevSecOps, are often reactive and inadequate in keeping pace with change.
Artificial intelligence
fromDevOps.com
1 month ago

HoundDog.ai Code Scanner Shifts Data Privacy Responsibility Left - DevOps.com

HoundDog.ai today made generally available a namesake static code scanner that enables security and privacy teams to enforce guardrails on sensitive data embedded in large language model (LLM) prompts or exposed artificial intelligence (AI) data sinks, such as logs and temporary files, before any code is pushed to production. Company CEO Amjad Afanah said the HoundDog.ai scanner enables DevSecOps teams to embrace a privacy-by-design approach to building applications. The overall goal is to enable organizations to shift more responsibility for privacy left toward application development teams as code is being written, he added.
Privacy professionals
fromThe Motley Fool
1 month ago

2 Tech Stocks With More Potential Than Any Cryptocurrency | The Motley Fool

GitLab is a comprehensive DevSecOps platform that integrates security practices into every phase of the software development lifecycle, providing a single application for various needs.
Tech industry
#ai
fromDevOps.com
1 month ago
Artificial intelligence

Cycode Delivers AI Agent to Assess How Exploitable Vulnerabilities Are - DevOps.com

fromDevOps.com
4 months ago
Artificial intelligence

AI-Powered DevSecOps: Navigating Automation, Risk and Compliance in a Zero-Trust World - DevOps.com

fromDevOps.com
1 month ago
Artificial intelligence

Cycode Delivers AI Agent to Assess How Exploitable Vulnerabilities Are - DevOps.com

fromDevOps.com
2 months ago

DevOps Meets Blazor in 2025: Streamlining .NET Web App Delivery for the Future - DevOps.com

Blazor's rise aligns with transformative shifts in the DevOps landscape, particularly with AI and ML integration, which enhances DevOps processes and app performance.
Web frameworks
DevOps
fromDevOps.com
2 months ago

"Shove Left" - Dumping Downstream Tasks Onto Developers - A Recipe for Failure - DevOps.com

Shift Left must focus on collaboration and enablement, rather than shifting responsibilities onto developers.
#ai-in-devops
#application-security
fromDevOps.com
5 months ago
Artificial intelligence

Symbiotic Security Unveils AI Coding Tool Trained to Identify Vulnerabilities - DevOps.com

fromDevOps.com
5 months ago
Software development

Report: Bulk of Application Vulnerabilities Don't Require Immediate Attention - DevOps.com

fromDevOps.com
5 months ago
Artificial intelligence

Symbiotic Security Unveils AI Coding Tool Trained to Identify Vulnerabilities - DevOps.com

fromDevOps.com
5 months ago
Software development

Report: Bulk of Application Vulnerabilities Don't Require Immediate Attention - DevOps.com

#devops
DevOps
fromDevOps.com
3 months ago

DevEx Got You This Far: What's Next for True DevSecOps Maturity? - DevOps.com

Security integration in DevOps requires more than just improved developer experience; it needs a shift to shared responsibility and culture.
Organizations must advance beyond DevEx for true DevSecOps maturity.
#software-development
fromIT Pro
3 months ago

Mainframe developers are stuck with outdated tools - GitLab and IBM want to solve that

This fragmentation leads to higher costs and limits developers' abilities to effectively collaborate and innovate, which is crucial in today's fast-paced tech landscape.
DevOps
#gitlab
fromVuejobs
3 months ago
DevOps

Intermediate Fullstack Engineer (Ruby/vue.js), Software Supply Chain Security: Pipeline Security at GitLab

fromInfoQ
3 months ago
DevOps

GitLab 17.11 Enhances DevSecOps with Custom Compliance Frameworks and Expanded Controls

fromVuejobs
3 months ago
DevOps

Intermediate Fullstack Engineer (Ruby/vue.js), Software Supply Chain Security: Pipeline Security at GitLab

fromInfoQ
3 months ago
DevOps

GitLab 17.11 Enhances DevSecOps with Custom Compliance Frameworks and Expanded Controls

DevOps
fromInfoQ
3 months ago

GitLab Adds AI Code Assistance with Self-Hosted GitLab 18 Release

GitLab 18.0 enhances its DevSecOps platform with AI features integrated into Premium and Ultimate tiers, improving development workflows.
DevOps
fromDevOps.com
4 months ago

GitLab Extends Scope and Reach of Core CI/CD Platform - DevOps.com

GitLab 18 improves CI/CD capabilities with integrated AI features and easier access to advanced tools.
DevOps
fromDevOps.com
3 months ago

AWS Extends Cloud Security Reach to Include DevSecOps Tools to Scan Code - DevOps.com

AWS's Amazon Inspector is now available, offering integrated code vulnerability scanning with GitHub and GitLab.
DevOps
fromDevOps.com
3 months ago

How to Embed Security Into Enterprise DevOps Pipelines - DevOps.com

DevSecOps promotes integrating security from the start of development processes.
A security-first culture is essential for effective DevSecOps implementation.
fromDevOps.com
3 months ago

JFrog Extends Alliance With NVIDIA to Secure AI Software Supply Chain - DevOps.com

JFrog and NVIDIA have expanded integrations to include the Enterprise AI Factory, enabling the management of AI applications through JFrog's Software Supply Chain Platform.
Artificial intelligence
fromDevOps.com
3 months ago

Code Signing in the DevOps Era: Silver Bullet or Security Theater? - DevOps.com

In high-velocity environments, security controls are only effective if they blend seamlessly with development workflows. This is where code signing often stumbles.
Information security
Software development
fromDevOps.com
4 months ago

Futurum Group Survey Surfaces DevSecOps Progress on Multiple Fronts - DevOps.com

Investments in software supply chain security are critical, with ASPM and DevSecOps automation being top priorities.
fromDevOps.com
4 months ago

Why CI/CD Pipelines Break Zero-Trust: A Hidden Risk in Enterprise Automation - DevOps.com

Zero-trust principles are crucial in modern cybersecurity yet CI/CD pipelines often ignore them by assuming automation is inherently trustworthy, creating security vulnerabilities.
DevOps
Information security
fromInfoQ
4 months ago

Visibility in Cloud Security: How Exactly Are Our Cloud Environments Configured?

Understanding security posture management is essential for identifying breaches and misconfigurations in cloud environments.
DevOps
fromInfoWorld
4 months ago

Bringing DevOps, DevSecOps, and MLOps together

EveryOps integrates DevOps, DevSecOps, and MLOps for a unified approach to software development.
The software development landscape is evolving towards more complex applications influenced by AI.
#cybersecurity
fromHackernoon
1 year ago
Artificial intelligence

Cyber Startup Pillar Security Raises $9M in Seed Funding to Defend AI with its Own Tech | HackerNoon

Artificial intelligence
fromHackernoon
1 year ago

Cyber Startup Pillar Security Raises $9M in Seed Funding to Defend AI with its Own Tech | HackerNoon

Pillar focuses on AI security risks and highlights the ineffectiveness of traditional cybersecurity tools in the intelligence age.
fromInfoWorld
5 months ago

Puppet devsecops updated to deal with security maladies

Perforce's Puppet Enterprise Advanced platform now integrates security remediation into infrastructure workflows, promoting swift responses to AI-driven threats and reducing operational inefficiencies.
DevOps
Artificial intelligence
fromDevOps.com
5 months ago

Endor Labs Adds AI Agents to Automate Application Security Reviews - DevOps.com

Endor Labs introduces AI agents for advanced security defect identification and remediation in application architecture.
Information security
fromHackernoon
2 years ago

From Repos to Risks: How Hardcoded Secrets in GitHub Source Code Create Security Risks | HackerNoon

Hardcoded secrets in source code expose organizations to significant security risks, necessitating greater awareness and secure practices in development environments.
[ Load more ]