Ben-Hur Santos OttforGuia de AppSec :: Blogblog.guiadeappsec.com.br·15 hours agoAppSec Newsletter 0037E chegamos a mais uma edição da nossa newsletter! Vídeo Novo no canal Guia de AppSec https://www.youtube.com/watch?v=-lLgMupOqIw Links 🎖️ Google | If It’s Not Secure, It Should Not Compile: Preventing DOM-Based XSS in Large-Scale Web Development ...Discuss·33 readsappsec
Bellevue PublishersforBellevue Publishersbellevuepublishers.hashnode.dev·Oct 22, 2024Navigating DevSecOps Best Practices: From Theory to Real-World ApplicationIf you’ve been working in or are interested in IT, you’ve probably heard the term ‘DevSecOps’ bandied about, but what does it really mean, and how do you put it into practice? What is DevSecOps? Probably in simple terms, DevSecOps is DevOps that has ...DiscussDevSecOps
Subhanshu Mohan Guptablogs.subhanshumg.com·Oct 22, 2024Securing Kubernetes Operations with Runtime Security Best PracticesWelcome to the 9th installment of my Kubernetes series wherw we’ll dive into advanced runtime security techniques for Kubernetes environments to detect anomalies, enforce strict container security policies, and mitigate risks in production. Introduct...DiscussMastering Kubernetes: Revolutionizing Cloud-Native OperationsKubernetes
sifytechnologiessifysifytechnologiessify.hashnode.dev·Oct 21, 2024Sify's DevSecOps Services: Integrating Security Into Every Step of the Development LifecycleIn today's fast-paced digital landscape, the need for rapid application development and deployment has never been more critical. However, speed should never come at the cost of security. Recognizing the importance of embedding security into the very ...DiscussDevSecOps
Reza RashidiforDevSecOpsGuidesrezaduty-1685945445294.hashnode.dev·Oct 21, 2024Vulnerability Bill of MaterialsA Bill of Materials (BOM) is a crucial component in software development and supply chain management, providing a detailed list of components, libraries, and dependencies used in creating a software product. Security is heavily involved in this proce...Discuss·81 readssbom
Muzaffar Khanmuzaffarkhan.hashnode.dev·Oct 20, 2024🔐 Integrating Security in Jenkins Pipelines 🔐In today’s fast-paced software development world, ensuring security throughout the CI/CD pipeline is critical. Here’s a quick guide on how to seamlessly integrate security into Jenkins pipelines for enhanced safety and accountability: 1️⃣ Integrating...DiscussDevSecOps
Muzaffar Khanmuzaffarkhan.hashnode.dev·Oct 20, 2024Linux SSH SecuringSecuring an SSH connection is critical for protecting servers from unauthorized access and potential attacks. Here are several best practices to enhance SSH security: 1. Disable Root Login Why: Allowing direct root access can be risky since it provi...DiscussLinux
Jasminchicajas23.hashnode.dev·Oct 20, 2024De la Solicitud a la Asistencia: Mi Experiencia como Becaria de HashiConfA principios de este año, tuve la increíble oportunidad de solicitar la Beca HashiCorp para asistir a HashiConf 2024 en Boston, MA. Solo 10 personas fueron seleccionadas para esta beca, lo que hizo que esta experiencia fuera aún más significativa y e...DiscussDevops
Jasminchicajas23.hashnode.dev·Oct 20, 2024From Application to Attendance: My Experience as a HashiConf ScholarEarlier this year, I had the incredible opportunity to apply for the HashiCorp Scholarship to attend HashiConf 2024 in Boston, MA. Only 10 people were selected for this scholarship, making it an even more meaningful and special experience.The scholar...Discusshashiconf
sifytechnologiessifysifytechnologiessify.hashnode.dev·Oct 18, 2024Sify’s DevSecOps Services: Securing Innovation with Seamless IntegrationIn today’s fast-paced digital landscape, businesses are under increasing pressure to deliver software quickly and efficiently, while ensuring that their applications are secure and compliant. Traditional security measures, often implemented at the en...DiscussDevSecOps Services