DevSecOps

Why Businesses Need to Transform From DevOps to DevSecOps

Content By Devops .com The need for modern applications to support continuous integration, delivery and deployment spawned the need for DevOps. Increasingly, as cyberthreats evolve and grow and application development methods and time frames change, security now needs to be an integral part of today’s...

5 Steps to an Open Source DevOps Strategy

Content By Devops .com Open source technology thrives during times of mass disruption, and this pandemic has been no different. Across the board, companies are accelerating their digital transformation and DevOps strategies, looking to open source technology as a way to streamline operations. While deploying...

DevSecOps Implementation: It’s About the Data

Content By Devops .com It seems we are constantly barraged with, “So-and-so announced that their systems had been breached and 80,000 user records were stolen,” notices. In fact, https://haveibeenpwned.com/ lists ten billion hacked accounts. That is no surprise. Databases exist to pool related data together....

DevSecOps Implementation: EDR/XDR

Content By Devops .com We mentioned host intrusion detection and network intrusion detection in an earlier blog, and mentioned firewalls a couple of times in passing. Let’s delve a bit into the history to understand how these tools’ functionality has evolved over time. On the...

DevSecOps Implementation: SIEM

Content By Devops .com The world is filled with events. Our inbox floods with events that marketers really want us to pay attention to, while news feeds flood us with events they’re trying to raise above the background noise, but then, the dog barking interrupts...