Muzaffar Khanmuzaffarkhan.hashnode.dev·Oct 20, 2024🔐 Integrating Security in Jenkins Pipelines 🔐In today’s fast-paced software development world, ensuring security throughout the CI/CD pipeline is critical. Here’s a quick guide on how to seamlessly integrate security into Jenkins pipelines for enhanced safety and accountability: 1️⃣ Integrating...DiscussDevSecOps
Ankit chaurasiyaforAnkit's Notesankitchaurasiya84.hashnode.dev·Oct 19, 2024Introducing sast-scan: A Lightweight SAST npm Package for JavaScript Security🛡️ Secure Your JavaScript Code with Ease. Security is a critical aspect of software development, and as developers, we should all strive to ensure our applications are free of vulnerabilities. Introducing sast-scan, a simple yet powerful static appl...Discusssast-scan
Deepak parashartechfordummys.hashnode.dev·Sep 24, 2024DevSecOps Tools: A Comprehensive How-To Guide for YARN, GITLEAKS, NJSSCAN, SEMGREP, RETIRE, TRIVY, ZAP, SAST, and DASTIn the modern software development landscape, security has become a vital aspect of the development lifecycle. DevSecOps is the practice of integrating security into every phase of DevOps, ensuring that security is part of the continuous integration ...Discussnjsscan
Piyush T Shahpiyops.com·Sep 14, 2024Best Practices for Automating Security Testing in DevSecOps (2024)A Comprehensive Guide In today's fast-paced software development landscape, integrating security into the DevOps pipeline—commonly referred to as DevSecOps—is crucial. As organizations strive for rapid delivery while maintaining robust security, auto...DiscussSAST
ajay singhlearwithme.hashnode.dev·Aug 16, 2024Step-by-Step Guide to DevSecOps Pipeline with Jenkins and Docker and SAST and DAST Tools.Prerequisites:- Hardware Requirement Minimum hardware requirements: 256 MB of RAM 1 GB of drive space (although 10 GB is a recommended minimum if running Jenkins as a Docker container) Recommended hardware configuration for a small team: 4 GB+ ...Discuss·59 readssonarqube quality gate
Arshan Dabirsiaghinahsra.hashnode.dev·Jul 29, 2024Sustained Attention Fatigue in Vulnerability AnalysisThe predominant hobby of my teenage years and the main focus of my first 10 years of my career was a mix of very similar activities: code review, bug hunting, exploit development, and building scanners/reviewing scanner output. One particularly inten...Discuss·2 likes·158 readsappsec
Samikshya Sapkotasamikshyasapkota.hashnode.dev·Jul 24, 2024Security Testing Tools in DevSecOps (SAST, DAST & SCA)In the dynamic landscape of software development, security is more important than ever. As our lives become more connected through technology, the risks from software vulnerabilities grow. With cyber threats on the rise, it's important to know the di...Discuss·42 readssecurity testing tools
Cloud Tunedcloudtuned.hashnode.dev·Jul 6, 2024Understanding Checkmarx: Securing Your Code from WithinUnderstanding Checkmarx: Securing Your Code from Within Introduction In an era where cyber threats are ever-evolving, securing software applications from vulnerabilities is paramount. Checkmarx is a leading application security testing solution desig...Discussstatic analysis
Maxat Akbanovmaxat-akbanov.com·Jun 6, 2024Get started with Gitleaks toolGitleaks is an open-source SAST tool designed to detect and prevent secrets (such as API keys, passwords, and other sensitive information) from being committed to version control repositories. It scans the entire repository history, including directo...Discuss·64 readstoolsDevops
Cloud Tunedcloudtuned.hashnode.dev·Jun 1, 2024Understanding GitLab SAST: A Beginner's GuideUnderstanding GitLab SAST: A Beginner's Guide Introduction In today's software development landscape, security is paramount. As organizations increasingly rely on code to drive their operations, ensuring that this code is free from vulnerabilities is...DiscussGitLab