Secure All Software

Share this post

User's avatar
Secure All Software
Weekly DevSecOps Updates - Issue #5
Copy link
Facebook
Email
Notes
More

Weekly DevSecOps Updates - Issue #5

Andreas Tiefenthaler's avatar
Andreas Tiefenthaler
Nov 14, 2018

Share this post

User's avatar
Secure All Software
Weekly DevSecOps Updates - Issue #5
Copy link
Facebook
Email
Notes
More
Share

Links

An introduction on how to use browser built in tools to investigate the client-side source code and start hunting for security bugs.

Leveraging automation can contribute to an orderly production environment—and make the secure path the path to walk easily.

Stop obsessing about theoretical attacks and instead use real world scenarios to make sure you look into the right issues first.

Passwords are the keys to our digital kingdoms, and also the weakest link in our security chain. Securing them is a combination of applied technology and user education.

A modern cloud application with multiple microservices is filled with confidential data that needs to be separated and managed.

Been considering your app's security this month? Here's some security advice to help keep you safe from hackers and avoid any surprises.

Tools and Tech

Awesome Ruby Security resources. A curated list of security relevant information for Ruby and Ruby on Rails applications.

A project security/vulnerability/risk scanning tool - It will run security checks on your codebase and supports a variety of languages including Ruby, Node.js, Python and many more.

Watch & Listen

One of the main  benefits of serverless is the ability to shift server administration- and platform management-related tasks to a third party, allowing for a greater focus on development and deployment. But this freedom can come at a price — relying on serverless also means, for example, giving more control to a third party.

What is up?

BSides Bucharest event for 2018

BSides Dubai event for 2018


Subscribe to Secure All Software

By Andreas Tiefenthaler · Launched 2 years ago
A Newsletter for Developers, DevOps and Security Engineers

Share this post

User's avatar
Secure All Software
Weekly DevSecOps Updates - Issue #5
Copy link
Facebook
Email
Notes
More
Share

Discussion about this post

User's avatar
Burn your API keys!
Looking at API keys as a threat to your companies existence opens up the idea of using application identities and create temporary credentials based on…
Mar 29, 2024 • 
Andreas Tiefenthaler
3

Share this post

User's avatar
Secure All Software
Burn your API keys!
Copy link
Facebook
Email
Notes
More
Open Source Security
Innovation and risk lie in the vast landscape of open-source software (OSS).
Apr 5, 2024 • 
Andreas Tiefenthaler
2

Share this post

User's avatar
Secure All Software
Open Source Security
Copy link
Facebook
Email
Notes
More
You are doing it wrong! Kubernetes Image Tags
9 out of 10 deployments are doing it wrong, can you guess why?
Sep 15, 2023 • 
Andreas Tiefenthaler
1

Share this post

User's avatar
Secure All Software
You are doing it wrong! Kubernetes Image Tags
Copy link
Facebook
Email
Notes
More

Ready for more?

© 2025 Substack Inc
Privacy ∙ Terms ∙ Collection notice
Start writingGet the app
Substack is the home for great culture

Share

Copy link
Facebook
Email
Notes
More

Create your profile

User's avatar

Only paid subscribers can comment on this post

Already a paid subscriber? Sign in

Check your email

For your security, we need to re-authenticate you.

Click the link we sent to , or click here to sign in.