Ensuring Robust Security of a Containerized Environment
October 26, 2023 | David Balaban
Stay Informed
Sign up to receive the latest security news and trends straight to your inbox from LevelBlue.
API Security in the Fast Lane
November 30, 2022 | Ali Cameron
The content of this post is solely the responsibility of the author. LevelBlue ...
Choosing a DAST Solution: What to Pay Attention to?
November 01, 2022 | Alex Vakulov
The content of this post is solely the responsibility of the author. LevelBlue ...
DevSecOps monitor and decommission
July 12, 2022 | Keith Thomas
This is the final article of the DevSecOps series and how it overlays onto ...
Authenticating legacy apps with a reverse proxy
June 28, 2022 | Keith Casey
This blog was written by an independent guest blogger.
DevSecOps deploy and operate processes
June 13, 2022 | Keith Thomas
In the previous article, we covered the release process and how to secure the ...
DevOps release process
April 26, 2022 | Keith Thomas
In the previous article, we covered the build and test process and why it’s ...
DevSecOps build and test process
April 06, 2022 | Keith Thomas
In the previous article about the coding process, we covered developers using ...
DevSecOps code process
February 28, 2022 | Keith Thomas
Best practices In the first article in this series we covered the basics. In ...
DevSecOps plan process
January 27, 2022 | Keith Thomas
In the DevOps and DevSecOps Introduction, What is DevOps, we reviewed how our ...
What is DevOps and DevSecOps?
November 17, 2021 | Keith Thomas
This is the first of a blog series on DevSecOps. This first blog is an overview ...
Rooting out the cybersecurity risk in your CI/CD pipeline
February 04, 2021 | Bernard Brode
This blog was written by an independent guest blogger.
Why application-layer encryption is essential for securing confidential data
December 15, 2020 | Theodoros Karasavvas
This blog was written by an independent guest blogger.
Finding problems that matter
July 30, 2020 | Roger Thornton
This blog was jointly authored with Ed Amoroso. See their previous blog for ...
The art of pushing left in application security
May 08, 2019 | Kelley Bryant
Today, software is being developed at a breakneck speed. Agile development and ...
Software Bill of Materials (SBoM) - Does It Work for DevSecOps?
January 14, 2019 | Rob Graham
There has been much discussion of a “software bill of materials” (SBoM) lately, ...
Observability and Visibility in DevSecOps
October 01, 2018 | Noah Beddome
To celebrate AllDayDevOps coming up October 17 - here's an on-topic blog.
The Security Policy to Development Procedure Gap
May 21, 2018 | Altaz Valani
Usually when we talk about DevOps, there's an emphasis on development and ...