Introduction to Software Composition Analysis and How to Select an SCA Tool

April 17, 2024 | Alex Vakulov

Introduction to Software Composition Analysis and How to Select an SCA Tool

April 17, 2024 | Alex Vakulov

The content of this post is solely the responsibility of the author. LevelBlue ...

Ensuring Robust Security of a Containerized Environment

October 26, 2023 | David Balaban

The content of this post is solely the responsibility of the author. LevelBlue ...

API Security in the Fast Lane

November 30, 2022 | Ali Cameron

The content of this post is solely the responsibility of the author. LevelBlue ...

Choosing a DAST Solution: What to Pay Attention to?

November 01, 2022 | Alex Vakulov

The content of this post is solely the responsibility of the author. LevelBlue ...

DevSecOps monitor and decommission

July 12, 2022 | Keith Thomas

This is the final article of the DevSecOps series and how it overlays onto ...

Authenticating legacy apps with a reverse proxy

June 28, 2022 | Keith Casey

This blog was written by an independent guest blogger.

DevSecOps deploy and operate processes

June 13, 2022 | Keith Thomas

In the previous article, we covered the release process and how to secure the ...

DevOps release process

April 26, 2022 | Keith Thomas

In the previous article, we covered the build and test process and why it’s ...

DevSecOps build and test process

April 06, 2022 | Keith Thomas

In the previous article about the coding process, we covered developers using ...

DevSecOps code process

February 28, 2022 | Keith Thomas

Best practices In the first article in this series we covered the basics. In ...

DevSecOps plan process

January 27, 2022 | Keith Thomas

In the DevOps and DevSecOps Introduction, What is DevOps, we reviewed how our ...

What is DevOps and DevSecOps?

November 17, 2021 | Keith Thomas

This is the first of a blog series on DevSecOps. This first blog is an overview ...

Rooting out the cybersecurity risk in your CI/CD pipeline

February 04, 2021 | Bernard Brode

This blog was written by an independent guest blogger.

Why application-layer encryption is essential for securing confidential data

December 15, 2020 | Theodoros Karasavvas

This blog was written by an independent guest blogger.

Finding problems that matter

July 30, 2020 | Roger Thornton

This blog was jointly authored with Ed Amoroso. See their previous blog for ...

The art of pushing left in application security

May 08, 2019 | Kelley Bryant

Today, software is being developed at a breakneck speed. Agile development and ...

The art of pushing left in application security

May 08, 2019 | Kelley Bryant

Today, software is being developed at a breakneck speed. Agile development and ...

Software Bill of Materials (SBoM) - Does It Work for DevSecOps?

January 14, 2019 | Rob Graham

There has been much discussion of a “software bill of materials” (SBoM) lately, ...

Observability and Visibility in DevSecOps

October 01, 2018 | Noah Beddome

To celebrate AllDayDevOps coming up October 17 - here's an on-topic blog.

The Security Policy to Development Procedure Gap

May 21, 2018 | Altaz Valani

Usually when we talk about DevOps, there's an emphasis on development and ...