DEV Community

# devsecops

Integrating security practices into the DevOps lifecycle.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How I Built, Scanned, and Automated a Docker Pipeline

How I Built, Scanned, and Automated a Docker Pipeline

Comments
10 min read
Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

Comments
28 min read
Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

Comments
28 min read
Local Guardrails for Secrets Security in the Age of AI Coding Assistants

Local Guardrails for Secrets Security in the Age of AI Coding Assistants

Comments
8 min read
Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

1
Comments
29 min read
Short-Lived Credentials in Agentic Systems: A Practical Trade-off Guide

Short-Lived Credentials in Agentic Systems: A Practical Trade-off Guide

1
Comments 1
11 min read
Best Snyk Alternatives in 2026: Which AppSec Tool Should You Choose?

Best Snyk Alternatives in 2026: Which AppSec Tool Should You Choose?

2
Comments 1
12 min read
Inside WatchTower: 4-layer defacement detection in async Python

Inside WatchTower: 4-layer defacement detection in async Python

Comments
8 min read
Vulnerability Remediation Prioritization — How to Handle Hundreds of CVEs Without Getting Overwhelmed

Vulnerability Remediation Prioritization — How to Handle Hundreds of CVEs Without Getting Overwhelmed

Comments
8 min read
We rotated our JWKS without overlap. Here is the 4-minute window that broke prod.

We rotated our JWKS without overlap. Here is the 4-minute window that broke prod.

3
Comments
5 min read
The Rise of the Machine Identity

The Rise of the Machine Identity

1
Comments
2 min read
Attackers Are Not Breaking In Anymore — They Are Logging In as Your Machines

Attackers Are Not Breaking In Anymore — They Are Logging In as Your Machines

Comments
1 min read
🔐Enforcing image provenance in Kubernetes using Cosign + Sigstore + Kyverno

🔐Enforcing image provenance in Kubernetes using Cosign + Sigstore + Kyverno

Comments
2 min read
NemoClaw for the Enterprise: Installing NemoClaw and Bootstrapping the Sandbox (Part 2)

NemoClaw for the Enterprise: Installing NemoClaw and Bootstrapping the Sandbox (Part 2)

2
Comments
11 min read
Auth regression tests for CI: what to assert and why

Auth regression tests for CI: what to assert and why

Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.