Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

DevSecOps

DevSecOps - Why, When & How?

Delve into the responsibilities and importance of DevSecOps , and address several crucial aspects of DevSecOps, including the ideal timing for implementation, the responsibilities and qualifications of the team or individual responsible for managing the DevSecOps function, KPIs for evaluating success, and the direction in which the role of DevSecOps is evolving. Our Panelists: Alexander “Sasha” Barshay DevSecOps Team Lead @Qwilt Rom Carmel CEO @apono.io Heath Newburn Distinguished Field Engineer @Pagerduty Idan Pinto DevSecOps @fiverr.

Is it ODD to Shift Left? Building Elite DevSecOps Performers

In today’s world, customers expect top-notch digital experiences. Apps that are slow, or leak sensitive data, will alienate even the most ardent users. This session will explore the underlying use cases for shifting security and observability left with two emerging practices, DevSecOps and Observability Driven Design.

Tracking the transport of radioactive sources with blockchain

This week, Australian authorities recovered a tiny capsule, just 6mm x 8mm (0.24 x 0.31 inches) along a 900km section of Australia’s longest highway, the Great Northern Highway. The pea-sized capsule was a radiation gauge containing caesium-137, a radioactive material with a half-life of 30.05 years, that is used to measure the density and flow of materials in the mining, and oil and gas industries.

5 Advanced DevSecOps Techniques to Try in 2023

If you’re here, you know the basic DevSecOps practices like incorporating proper encryption techniques and embracing the principle of least privilege. You may be entering the realm of advanced DevSecOps maturity, where you function as a highly efficient, collaborative team, with developers embracing secure coding and automated security testing best practices.

How to Bake Security into your CI/CD Pipeline

According to IBM Security's "The Cost of a Data Breach Report", the global cost of data breaches in 2022 increased by 2.6% compared to previous year, reaching $4.35 million. The source code of major companies like Nvidia, Microsoft, Uber, Slack, Toyota was leaked, often caused by usage of hardcoded secrets (you can see more details in the infographics below). In those cases, lateral movements were compromising software supply chain security. In their report Gartner claims about 45% of companies should expect to become targets of supply chain attacks by 2025.

Quick Start Guide: Integrate Veracode in Your DevOps Pipeline

For today’s DevSecOps teams, the demands continue to intensify. Application portfolios and codebases continue to grow, while cyberattacks remain an ever-present danger. More than ever, it’s vital to ensure security gaps are identified and addressed with maximum speed and efficiency. In order to do this, you need to establish a continuous feedback loop on security threats, so you can realize optimized, sustained results – which is exactly how Veracode helps.

DoD + DevSecOps: A path toward speed and agility

As the US Department of Defense’s (DoD’s) Software Modernization Strategy is put into place, agility, cloud adoption, and the software-factory methodology are top of mind. But according to a new study from the Hudson Institute, the DoD’s current approach to software and software updates isn’t fast enough to keep pace with modern warfare.