© 2023 Hashnode
#devsecops
Many businesses now run on open-source software for mission-critical functions, a trend that has only accelerated in recent years. Although there are many advantages to using open sources, such as red…
Shift Left Security is a new approach to software development that emphasizes the integration of security measures into the early stages of the software development lifecycle (SDLC), rather than waiti…
Security teams are facing another obstacle as more work-loads moved online and data breaches become commonplace. Earlier, query was only what is security? Now, what is the better security? Better secu…
Disciplined DevOps is an enterprise-ready approach that extends general DevOps to the Next Level by including critical security, data management, release management, and business operations layers in …
Software development would not be complete without code reviews. They aid in ensuring high-quality code, finding flaws in it, and encouraging teamwork. In this post, we'll go over why code reviews are…
Penetration testing seeks to exploit a security gap, while vulnerability scanning checks for known exposures and generates a report that can be used for risk mitigation. Searching and Scanning Securit…
I'm a DevOps engineer. I hope that's still a thing because, according to some, "DevOps is dead; long live platform engineering." There is no denying that recently we started to see terms like "platform engineering," "developer portal," or e…
I have worked as a developer for React for more than three years. Hundreds of developers, both amateur and experienced, have approached me with similar problems since I began working with React. Sever…
HTTPS uses Transport Layer Security (TLS)/SSL protocol to encrypt connections between the client and the server. It uses asymmetric encryption that creates private and public keys to secure the commun…
Trivy is an open-source vulnerability scanner designed to identify security issues in container images and filesystems. It was developed specifically for use with container technologies like Docker, K…