Introduction to Software Composition Analysis and How to Select an SCA Tool
April 17, 2024 | Alex Vakulov
Stay Informed
Sign up to receive the latest security news and trends straight to your inbox from LevelBlue.
Introduction to Software Composition Analysis and How to Select an SCA Tool
April 17, 2024 | Alex Vakulov
The content of this post is solely the responsibility of the author. LevelBlue ...
Ensuring Robust Security of a Containerized Environment
October 26, 2023 | David Balaban
The content of this post is solely the responsibility of the author. LevelBlue ...
API Security in the Fast Lane
November 30, 2022 | Ali Cameron
The content of this post is solely the responsibility of the author. LevelBlue ...
Choosing a DAST Solution: What to Pay Attention to?
November 01, 2022 | Alex Vakulov
The content of this post is solely the responsibility of the author. LevelBlue ...
DevSecOps monitor and decommission
July 12, 2022 | Keith Thomas
This is the final article of the DevSecOps series and how it overlays onto ...
Authenticating legacy apps with a reverse proxy
June 28, 2022 | Keith Casey
This blog was written by an independent guest blogger.
DevSecOps deploy and operate processes
June 13, 2022 | Keith Thomas
In the previous article, we covered the release process and how to secure the ...
DevOps release process
April 26, 2022 | Keith Thomas
In the previous article, we covered the build and test process and why it’s ...
DevSecOps build and test process
April 06, 2022 | Keith Thomas
In the previous article about the coding process, we covered developers using ...
DevSecOps code process
February 28, 2022 | Keith Thomas
Best practices In the first article in this series we covered the basics. In ...
DevSecOps plan process
January 27, 2022 | Keith Thomas
In the DevOps and DevSecOps Introduction, What is DevOps, we reviewed how our ...
What is DevOps and DevSecOps?
November 17, 2021 | Keith Thomas
This is the first of a blog series on DevSecOps. This first blog is an overview ...
Rooting out the cybersecurity risk in your CI/CD pipeline
February 04, 2021 | Bernard Brode
This blog was written by an independent guest blogger.
Why application-layer encryption is essential for securing confidential data
December 15, 2020 | Theodoros Karasavvas
This blog was written by an independent guest blogger.
Finding problems that matter
July 30, 2020 | Roger Thornton
This blog was jointly authored with Ed Amoroso. See their previous blog for ...
The art of pushing left in application security
May 08, 2019 | Kelley Bryant
Today, software is being developed at a breakneck speed. Agile development and ...
The art of pushing left in application security
May 08, 2019 | Kelley Bryant
Today, software is being developed at a breakneck speed. Agile development and ...
Software Bill of Materials (SBoM) - Does It Work for DevSecOps?
January 14, 2019 | Rob Graham
There has been much discussion of a “software bill of materials” (SBoM) lately, ...
Observability and Visibility in DevSecOps
October 01, 2018 | Noah Beddome
To celebrate AllDayDevOps coming up October 17 - here's an on-topic blog.
The Security Policy to Development Procedure Gap
May 21, 2018 | Altaz Valani
Usually when we talk about DevOps, there's an emphasis on development and ...