Jerome DecincoImplementing Threat Modeling in a DevOps WorkflowSecurity remains paramount in the contemporary digital landscape, especially within DevOps workflows. DevOps practices streamline the…6h ago
InInfoSec Write-upsbyTide FoundationReimagining cybersecurity for platform developersCybersecurity is broken. Let’s fix it!Oct 252
Talha KhaildWhy NGINX IngressController Isn’t the Best Choice for Production WorkloadsI haven’t used nginx as a Kubernetes IngressController since 2020. So, the information here may be outdated. However, recent issues…Nov 253Nov 253
Scott W HoughtonFrom Open-Source Simplicity to Enterprise-Grade Protection: Choosing the Right Vulnerability…In today’s fast-paced DevSecOps environment, security isn’t an afterthought — it’s a core component of the development lifecycle. Whether…2d ago2d ago
InITNEXTbyAndrew BloomanContainer Security ScanningKeep your containers vulnerability free and securely configuredSep 223Sep 223
Jerome DecincoImplementing Threat Modeling in a DevOps WorkflowSecurity remains paramount in the contemporary digital landscape, especially within DevOps workflows. DevOps practices streamline the…6h ago
InInfoSec Write-upsbyTide FoundationReimagining cybersecurity for platform developersCybersecurity is broken. Let’s fix it!Oct 252
Talha KhaildWhy NGINX IngressController Isn’t the Best Choice for Production WorkloadsI haven’t used nginx as a Kubernetes IngressController since 2020. So, the information here may be outdated. However, recent issues…Nov 253
Scott W HoughtonFrom Open-Source Simplicity to Enterprise-Grade Protection: Choosing the Right Vulnerability…In today’s fast-paced DevSecOps environment, security isn’t an afterthought — it’s a core component of the development lifecycle. Whether…2d ago
InITNEXTbyAndrew BloomanContainer Security ScanningKeep your containers vulnerability free and securely configuredSep 223
Indevsecops-communitybyKarthick DkkDangerous Root Login AccessWhy You Should Disable It and How to Protect Your SystemsDec 52
Jeff CooperBuilding Security Architecture in StagesRecently, I was discussing security architecture with a DevSecOps engineer who asked: “How can we implement a comprehensive security…1d ago
In4th CoffeebyTiexin GuoDependency Confusion Attacks and Prevention: Register Your Private Package NamesDependency confusion attacks exploit gaps in your software supply chain. Modern dependency management and best practices explained.Aug 252