Azure | Cloud | Cloud Engineering | Cloud Security | DevOps | DevSecOps | Microsoft Solutions Publish Azure DevOps Extensions using Azure Workload Identity Jesse Houwing 18 Sep, 2023
Azure | CI/CD | DevOps | DevOps and SRE | DevSecOps | GitHub | Microsoft Solutions | Security Protect the repository hosting your GitHub Action Jesse Houwing 18 Sep, 2023
AWS | Cloud | Cloud Security | DevSecOps AWS Open Source Observability: Visualization and Security Auditing with CloudMapper (Part 1) Martin Perez Rodriguez 23 Feb, 2023
DevSecOps | Security | Security Culture The need for DevSecOps in the embedded world Yashin Mehaboobe 16 Dec, 2022
Agile Architecture | Chaos Engineering | DevSecOps | Secure Software Development | Security | Sociotechnical | Software Technology Resilience, an introduction. Edzo Botjes 19 Nov, 2022
DevSecOps | Secure Software Development | Security Back to Back security testing Marinus Kuivenhoven 03 Nov, 2022
CI/CD | DevSecOps | GitHub | Software Technology CI/CD script injection on DevOps platform inputs: a silent vector over automation tools Martin Perez Rodriguez 31 Oct, 2022
AWS | Cloud | DevSecOps | Infrastructure | Software Development Cross account AWS resource access using Terraform Mike Woudenberg 06 May, 2022
DevSecOps | Security | Software Development | Software Quality 6 Pointers on Application Logging Jeroen Willemsen 05 Jan, 2022
DevSecOps | Security | Software Development Log4J - A 10 step mitigation plan Jeroen Willemsen, Edzo Botjes, Jesse Houwing
DevSecOps | Security Secure Deployment: 10 Pointers on Secrets Management Jeroen Willemsen, Ben de Haan
DevSecOps | Security | Sociotechnical Improving Security by influencing Human Behavior Edzo Botjes 19 Feb, 2021
Continuous Delivery | DevSecOps | Security From Build to Run: Pointers on Secure Deployment Jeroen Willemsen, Ben de Haan
Agile Transformation | DevSecOps | Security Threat Modeling - Start using evil personas Dave van Stein 30 Nov, 2020