-
All Content, Security, Value Stream Management
May Community Hour
1 Resource(s) -
All Content, Technical Aspects, On-Demand Events, Security, Open Source, Process, Search All Content
Technical Aspects - Open Source
2 Resource(s) -
All Content, On-Demand Events, AIOps & MLOps, Security, Observability, Search All Content
How To Connect DevSecOps, Observability and AIOps To Maximize Business Value
2 Resource(s) -
All Content, Technical Aspects, On-Demand Events, Security, Process, Search All Content
Technical Aspects - The DevSecOps Journey
4 Resource(s) -
All Content, On-Demand Events, People & Culture, Security, Team Building, Search All Content
Your Developer Autonomy Journey
2 Resource(s) -
All Content, On-Demand Events, Security, Open Source, Automation & Technology, Search All Content
Why Self-Hosted is the New On-Prem for Open Source and Data Ownership
3 Resource(s) -
All Content, On-Demand Events, Security, Search All Content
Transforming Information Security
3 Resource(s) -
All Content, Security, Search All Content
Embedding API Security by Design into DevOps Pipelines
3 Resource(s) -
All Content, On-Demand Events, Security, Automation & Technology, Search All Content
DevOps: The Return of Security
3 Resource(s) -
All Content, Security, Search All Content
Empowering Developers at the Intersection of AppSec and CloudSec
2 Resource(s) -
All Content, On-Demand Events, Security, Automation & Technology, Search All Content
Embedding Security Testing in Modern DevOps Pipelines
3 Resource(s) -
All Content, On-Demand Events, Security, Open Source, Automation & Technology, Search All Content
Zero-Trust Networking Examples Across Multiple K8S Clusters, Using Neuvector
3 Resource(s) -
All Content, On-Demand Events, Security, Open Source, Automation & Technology, Search All Content
What You Should Know About Risks in Open Source, from Vulnerabilities to Lock-in
3 Resource(s) -
All Content, Security, Author Book Series, Search All Content
Author Series: Security Awareness Program Management
5 Resource(s) -
All Content, On-Demand Events, Security, Observability, Automation & Technology, Search All Content
Improving Observability Through Modern Log Management
3 Resource(s) -
All Content, On-Demand Events, Security, Automation & Technology, Search All Content
Pentesting at Scale
3 Resource(s) -
All Content, On-Demand Events, Security, Observability, Automation & Technology, Search All Content
Beyond Monitoring: The Rise of Observability Platform
2 Resource(s) -
All Content, On-Demand Events, CI/CD, Security, Automation & Technology, Search All Content
How a Military Strategy Can Help Secure Your App Deployment Cycle
3 Resource(s) -
All Content, On-Demand Events, CI/CD, Security, Automation & Technology, Search All Content
How to Integrate Security and Quality Into Your CI/CD Pipelines and What KPIs to Measure
2 Resource(s) -
All Content, On-Demand Events, Security, Kubernetes, Automation & Technology, Search All Content
Kubernetes Workloads at Scale: Ensuring Security, Compliance and Operational Readiness
2 Resource(s) -
All Content, On-Demand Events, Security, Automation & Technology, Search All Content
The Security and Compliance Tax
3 Resource(s) -
All Content, On-Demand Events, Security, Automation & Technology, Search All Content
DevSecOps: Shifting Left for Application Security in your Pipelines
2 Resource(s) -
All Content, On-Demand Events, Security, Automation & Technology, Search All Content
CI Workflow Supply Chain: Security Risks and How to Find Them
2 Resource(s) -
All Content, On-Demand Events, Security, Open Source, Automation & Technology, Search All Content
OS Project Pyrsia: How To Protect the Open Source Supply Chain
1 Resource(s) -
All Content, On-Demand Events, Security, Automation & Technology, Search All Content
DoD's cATO
3 Resource(s) -
All Content, On-Demand Events, Security, Automation & Technology, Search All Content
Your Developers Decide Your Security Posture, Not Your Security Teams
2 Resource(s) -
All Content, On-Demand Events, Security, Automation & Technology, Search All Content
From DevOps to DevSecOps
3 Resource(s) -
All Content, CI/CD, Security, Government, Value Stream Management, Search All Content
How to Integrate the Software Bill of Materials Into the CI/CD Process
2 Resource(s) -
All Content, On-Demand Events, CI/CD, Security, Kubernetes, Automation & Technology, Search All Content
Faster, Strong, More Secure Cloud-Native DevSecOps
3 Resource(s) -
All Content, Security, Certification Prep, Search All Content
DevSecOps Foundation
43 Resource(s) -
All Content, Technical Aspects, Security, Learning Lite, Search All Content
History of DevSecOps
1 Resource(s) -
All Content, Technical Aspects, Security, Government, Search All Content
Thinking Upstream about White House Cybersecurity Executive Order 14028
3 Resource(s) -
All Content, Technical Aspects, On-Demand Events, Security, Government, Learning Lite, Search All Content
DevOps Impact on Governance, Risk and Compliance (GRC)
1 Resource(s) -
All Content, Technical Aspects, On-Demand Events, SRE, Security, Search All Content
How SRE Fits Into the DevSecOps World
1 Resource(s) -
All Content, Technical Aspects, On-Demand Events, Security, Search All Content
DevSecOps Panel: Who’s looking out for the developers??
1 Resource(s) -
All Content, Technical Aspects, On-Demand Events, Security, Search All Content
How to successfully integrate security into your DevOps
2 Resource(s) -
All Content, Technical Aspects, On-Demand Events, Security, Search All Content
IT Modernization through DevSecOps
2 Resource(s) -
All Content, Technical Aspects, On-Demand Events, Security, Search All Content
The SolarWinds Hack and the Executive Order on Cybersecurity happened – It is time to prepare
1 Resource(s) -
All Content, Technical Aspects, On-Demand Events, Security, Search All Content
Go Beyond DevSecOps to Continuous Security
2 Resource(s) -
All Content, Technical Aspects, On-Demand Events, Security, Search All Content
Three Reasons Developers Struggle With AppSec… And How to Make it Better
2 Resource(s) -
All Content, Technical Aspects, On-Demand Events, Security, Search All Content
Securing Your Pipes With A TACO
2 Resource(s) -
All Content, Technical Aspects, Security, Search All Content
DevSecOps Principles
2 Resource(s) -
All Content, Technical Aspects, On-Demand Events, Security, Search All Content
The Major Impact of Runtime Security Controls on Risks and Efficiency
2 Resource(s) -
All Content, Technical Aspects, On-Demand Events, Security, Kubernetes, Search All Content
The Do’s and Don’ts of Kubernetes Security
2 Resource(s) -
All Content, Technical Aspects, On-Demand Events, Security, Search All Content
DevSecOps: Moving Beyond SAST in Pipelines
2 Resource(s) -
All Content, Technical Aspects, On-Demand Events, Security, Search All Content
Measuring the Whole Hole
2 Resource(s) -
All Content, Technical Aspects, On-Demand Events, Security, Search All Content
Pipeline Security a Catalyst for DevSecOps
2 Resource(s) -
All Content, Technical Aspects, On-Demand Events, Cloud Native/Serverless, Security, Automation & Technology, Search All Content
Putting the “Sec” in DevSecOps: Automating Cloud Security as an Enabler
2 Resource(s) -
All Content, Technical Aspects, Security, Certification Prep, Learning Lite, Search All Content
Preview to DevSecOps Foundation
2 Resource(s) -
All Content, Technical Aspects, On-Demand Events, CI/CD, Security, Search All Content
A Practical Approach for Injecting Sec into DevOps
3 Resource(s) -
All Content, Technical Aspects, On-Demand Events, CI/CD, Security, Search All Content
Should I enforce security for Infrastructure as Code?
1 Resource(s) -
All Content, Technical Aspects, On-Demand Events, CI/CD, Security, Search All Content
CI/CD with Contrast Security
1 Resource(s)