DEV Community

# devsecops

Integrating security practices into the DevOps lifecycle.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
What LucidShark Would Have Caught Before the TanStack Attack Landed

What LucidShark Would Have Caught Before the TanStack Attack Landed

Comments
7 min read
Every CISO Needs an AIBOM in 2026 — Here's What Vendors Get Wrong

Every CISO Needs an AIBOM in 2026 — Here's What Vendors Get Wrong

Comments
8 min read
How to Review Code Your AI Agent Wrote While You Were Sleeping

How to Review Code Your AI Agent Wrote While You Were Sleeping

Comments
7 min read
Why Every CISO Needs an AIBOM in 2026 — And What Vendors Miss

Why Every CISO Needs an AIBOM in 2026 — And What Vendors Miss

Comments
9 min read
Four Pillars, One Platform: How Cybrium Unifies Code, Cloud, AI, and GRC

Four Pillars, One Platform: How Cybrium Unifies Code, Cloud, AI, and GRC

Comments
10 min read
Why I Stopped Letting Claude Shell Out for Security Scans

Why I Stopped Letting Claude Shell Out for Security Scans

Comments 1
10 min read
Zero Trust Is Not a Product — It Is a Discipline You Build

Zero Trust Is Not a Product — It Is a Discipline You Build

Comments
1 min read
CLAUDE.md Is a Security Boundary

CLAUDE.md Is a Security Boundary

1
Comments
7 min read
How I Built, Scanned, and Automated a Docker Pipeline

How I Built, Scanned, and Automated a Docker Pipeline

Comments
10 min read
Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

Comments
28 min read
Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

Comments
28 min read
Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

1
Comments
29 min read
Approve Once, Exploit Forever: The Trust Persistence Vulnerability Vendors Will Not Fix

Approve Once, Exploit Forever: The Trust Persistence Vulnerability Vendors Will Not Fix

1
Comments
6 min read
Short-Lived Credentials in Agentic Systems: A Practical Trade-off Guide

Short-Lived Credentials in Agentic Systems: A Practical Trade-off Guide

1
Comments 1
11 min read
Inside WatchTower: 4-layer defacement detection in async Python

Inside WatchTower: 4-layer defacement detection in async Python

Comments
8 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.