{"id":1682908,"date":"2017-10-09T18:59:27","date_gmt":"2017-10-09T22:59:27","guid":{"rendered":"https:\/\/securityboulevard.com\/?page_id=1682908"},"modified":"2019-03-06T14:16:59","modified_gmt":"2019-03-06T19:16:59","slug":"devops","status":"publish","type":"page","link":"https:\/\/securityboulevard.com\/devops\/","title":{"rendered":"DevOps Security"},"content":{"rendered":"<div id=\"pl-1682908\"  class=\"panel-layout\" ><div id=\"pg-1682908-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-1682908-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-1682908-0-0-0\" class=\"so-panel widget_text panel-first-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-1682908-0-0-0\" >\t\t\t<div class=\"textwidget\"><h1>DevOps Security<\/h1>\n<\/div>\n\t\t<\/div><\/div><div id=\"panel-1682908-0-0-1\" class=\"widget_text so-panel widget_custom_html\" data-index=\"1\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-scrollable pt-cv-colsys pt-cv-reused\" id=\"pt-cv-view-2f53dd3mdc\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div id=\"512438elso\" class=\"pt-cv-carousel pt-cv-slide\" data-ride=\"cvcarousel\" data-interval=10000>\n<div class=\"carousel-inner\"><div class=\"item active\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037597\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash.png\" class=\"pt-cv-thumbnail img-none\" alt=\"Three tiny people cleaning the inside of a hard drive\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >QNAP\u2019s Buggy Security Fix Causes Chaos<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T09:54:57-05:00\">5 days ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2037360\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/03\/Hackathons-Cybersecurity-770x300.jpg\" class=\"pt-cv-thumbnail img-none\" alt=\"North Korea IT worker scam\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self cvplbd\" target=\"_self\" >U.S. Agencies Seize Four North Korean IT Worker Scam Websites<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-22T09:54:07-05:00\">1 week ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div>\n<div class=\"item\"><div class=\"row\"><div class=\"col-md-12 col-sm-6 col-xs-12 pt-cv-content-item pt-cv-1-col\"  data-pid=\"2036919\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisa-director-easterly-to-leave-when-trump-assumes-presidency\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-default cvplbd\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"770\" height=\"300\" src=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/03\/jen-easterly-cisa-pd.png\" class=\"pt-cv-thumbnail img-none\" alt=\"Director of the Cybersecurity and Infrastructure Security Agency, Jen Easterly\" srcset=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/03\/jen-easterly-cisa-pd.png 770w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/03\/jen-easterly-cisa-pd-300x117.png 300w, https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/03\/jen-easterly-cisa-pd-768x299.png 768w\" sizes=\"auto, (max-width: 770px) 100vw, 770px\" \/><\/a>\n<div class=\"pt-cv-carousel-caption pt-cv-cap-w-img\"><h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/cisa-director-easterly-to-leave-when-trump-assumes-presidency\/\" class=\"_self cvplbd\" target=\"_self\" >CISA Director Easterly to Leave When Trump Assumes Presidency<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-19T10:08:53-05:00\">2 weeks ago<\/time><\/span><\/div><\/div><\/div><\/div><\/div><\/div>\n<a class=\"left carousel-control\" data-target=\"#512438elso\" data-cvslide=\"prev\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-left\"><\/span>\r\n\t\t\t\t\t<\/a>\r\n\t\t\t\t\t<a class=\"right carousel-control\" data-target=\"#512438elso\" data-cvslide=\"next\">\r\n\t\t\t\t\t\t<span class=\"glyphicon glyphicon-chevron-right\"><\/span>\r\n\t\t\t\t\t<\/a><\/div><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-a7bbf45peh\">#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 40px !important; font-weight: 600 !important; line-height: 1.0 !important; }\n@media (min-width: 768px) and (max-width: 991px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 20px !important }}\n@media (max-width: 767px) {#pt-cv-view-2f53dd3mdc .pt-cv-title a, #pt-cv-view-2f53dd3mdc  .panel-title { font-size: 14px !important }}\n#pt-cv-view-2f53dd3mdc .pt-cv-carousel-caption  { background-color: rgba(51,51,51,.6) !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-meta-fields * { color: #ffffff !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore  { color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-2f53dd3mdc .pt-cv-readmore:hover  { color: #ffffff !important; background-color: #00aeef !important; }<\/style>\r\n\t\t\t<\/div><\/div><div id=\"panel-1682908-0-0-2\" class=\"widget_text so-panel widget_custom_html panel-last-child\" data-index=\"2\" ><div class=\"textwidget custom-html-widget\"><div class=\"pt-cv-wrapper\"><div class=\"pt-cv-view pt-cv-pinterest pt-cv-colsys pt-cv-shadow pt-cv-no-bb pt-cv-pgloadmore pt-cv-reused\" id=\"pt-cv-view-63f1e1bp89\"><div data-id=\"pt-cv-page-1\" class=\"pt-cv-page\" data-cvc=\"1\"><div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037633\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/key-takeaways-from-the-latest-dod-enterprise-devsecops-fundamentals-update\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Key takeaways from the latest DoD Enterprise DevSecOps Fundamentals update\" title=\"\" data-cvpsrc=\"https:\/\/www.sonatype.com\/hubfs\/AI-Generated%20Media\/Images\/A%20clean%20and%20modern%20header%20image%20showing%20a%20secure%20software%20pipeline%20concept%20a%20digital%20representation%20of%20a%20factory%20producing%20software%20components%2C%20with%20i.jpeg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/key-takeaways-from-the-latest-dod-enterprise-devsecops-fundamentals-update\/\" class=\"_self cvplbd\" target=\"_self\" >Key takeaways from the latest DoD Enterprise DevSecOps Fundamentals update<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/daniel-glick\/\" rel=\"author\">Daniel Glick<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T16:15:53-05:00\">November 26, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/department-of-defense\/' title='Department of Defense' class='pt-cv-tax-department-of-defense'>Department of Defense<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/devsecops\/' title='DevSecOps' class='pt-cv-tax-devsecops'>DevSecOps<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sbom\/' title='SBOM' class='pt-cv-tax-sbom'>SBOM<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/software-bill-of-materials\/' title='software bill of materials' class='pt-cv-tax-software-bill-of-materials'>software bill of materials<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/software-supply-chain\/' title='software supply chain' class='pt-cv-tax-software-supply-chain'>software supply chain<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">As the cybersecurity landscape changes and threats evolve, the Department of Defense (DoD) has updated its Enterprise DevSecOps Fundamentals to align development practices with security imperatives further. This is part of a ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=2024 Sonatype Blog&feed_id=644&blog_url=https:\/\/www.sonatype.com\/blog\">2024 Sonatype Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037597\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"Three tiny people cleaning the inside of a hard drive\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2024\/11\/qnap-update-fail-richixbw-samu-lopez-T6u10VL2kjo-unsplash-290x130.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/qnap-bad-patch-richixbw\/\" class=\"_self cvplbd\" target=\"_self\" >QNAP\u2019s Buggy Security Fix Causes Chaos<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/richi\/\" rel=\"author\">Richi Jennings<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-26T09:54:57-05:00\">November 26, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/automatic-updates\/' title='automatic updates' class='pt-cv-tax-automatic-updates'>automatic updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/data-storage\/' title='data storage' class='pt-cv-tax-data-storage'>data storage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware\/' title='firmware' class='pt-cv-tax-firmware'>firmware<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-patch\/' title='firmware patch' class='pt-cv-tax-firmware-patch'>firmware patch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-security\/' title='firmware security' class='pt-cv-tax-firmware-security'>firmware security<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-update\/' title='firmware update' class='pt-cv-tax-firmware-update'>firmware update<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/firmware-updates\/' title='Firmware Updates' class='pt-cv-tax-firmware-updates'>Firmware Updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hard-disk-drive\/' title='hard disk drive' class='pt-cv-tax-hard-disk-drive'>hard disk drive<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/hard-drive\/' title='hard drive' class='pt-cv-tax-hard-drive'>hard drive<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/nas\/' title='NAS' class='pt-cv-tax-nas'>NAS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/os-security-updates\/' title='os security updates' class='pt-cv-tax-os-security-updates'>os security updates<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/qnap\/' title='QNAP' class='pt-cv-tax-qnap'>QNAP<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/qts\/' title='QTS' class='pt-cv-tax-qts'>QTS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/raid\/' title='RAID' class='pt-cv-tax-raid'>RAID<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/release-management\/' title='Release Management' class='pt-cv-tax-release-management'>Release Management<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/sb-blogwatch\/' title='SB Blogwatch' class='pt-cv-tax-sb-blogwatch'>SB Blogwatch<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security-update\/' title='security update' class='pt-cv-tax-security-update'>security update<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/storage\/' title='storage' class='pt-cv-tax-storage'>storage<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">RAID FAIL: NAS Maker does a CrowdStrike\u2014cleanup on \/dev\/dsk\/c1t2d3s4 please ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037563\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/what-is-ci-cd-security-risks-and-best-practices\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"What Is CI\/CD Security? Risks and Best Practices\" title=\"\" data-cvpsrc=\"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Fwhat-is-cicd-security&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/what-is-ci-cd-security-risks-and-best-practices\/\" class=\"_self cvplbd\" target=\"_self\" >What Is CI\/CD Security? Risks and Best Practices<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/legit-security\/\" rel=\"author\">Legit Security<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T16:23:24-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/appsec\/' title='AppSec' class='pt-cv-tax-appsec'>AppSec<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/best-practices\/' title='Best Practices' class='pt-cv-tax-best-practices'>Best Practices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/compliance\/' title='Compliance' class='pt-cv-tax-compliance'>Compliance<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/devops\/' title='DEVOPS' class='pt-cv-tax-devops'>DEVOPS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/threats\/' title='threats' class='pt-cv-tax-threats'>threats<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Continuous integration and continuous delivery (CI\/CD) pipelines are invaluable in software development. They expedite the deployment process and maintain teams at the forefront of innovation. But with these benefits come unique security ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Legit Security Blog&feed_id=931&blog_url=https:\/\/www.legitsecurity.com\/blog\">Legit Security Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037565\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/how-to-reduce-risk-from-exposed-secrets\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"How to Reduce Risk From Exposed Secrets\" title=\"\" data-cvpsrc=\"https:\/\/track.hubspot.com\/__ptq.gif?a=20956152&amp;k=14&amp;r=https%3A%2F%2Fwww.legitsecurity.com%2Fblog%2Freduce-risk-exposed-secrets&amp;bu=https%253A%252F%252Fwww.legitsecurity.com%252Fblog&amp;bvt=rss\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/how-to-reduce-risk-from-exposed-secrets\/\" class=\"_self cvplbd\" target=\"_self\" >How to Reduce Risk From Exposed Secrets<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/amanda-alvarez\/\" rel=\"author\">Amanda Alvarez<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T10:30:49-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/appsec\/' title='AppSec' class='pt-cv-tax-appsec'>AppSec<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/best-practices\/' title='Best Practices' class='pt-cv-tax-best-practices'>Best Practices<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/ciso\/' title='CISO' class='pt-cv-tax-ciso'>CISO<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/devops\/' title='DEVOPS' class='pt-cv-tax-devops'>DEVOPS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/explainers\/' title='Explainers' class='pt-cv-tax-explainers'>Explainers<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Understand how secrets end up exposed, and how to prevent this risk.\u00a0 ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Legit Security Blog&feed_id=931&blog_url=https:\/\/www.legitsecurity.com\/blog\">Legit Security Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037482\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Voice Phishing Attacks\" title=\"\" data-cvpsrc=\"https:\/\/cybeready.com\/wp-content\/uploads\/unnamed3.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/voice-phishing-attacks-how-to-prevent-and-respond-to-them\/\" class=\"_self cvplbd\" target=\"_self\" >Voice Phishing Attacks: How to Prevent and Respond to Them<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/nitzan-gursky\/\" rel=\"author\">Nitzan Gursky<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-25T05:15:35-05:00\">November 25, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/security-culture\/' title='Security Culture' class='pt-cv-tax-security-culture'>Security Culture<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Have you ever received a call from an unknown number and wondered who could be on the other end? It could be a vishing scam. Vishing, a combination of \u201cvoice\u201d and \u201cphishing\u201d, ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Cyber Security Awareness Training Blog | CybeReady&feed_id=770&blog_url=https:\/\/cybeready.com\/blog\">Cyber Security Awareness Training Blog | CybeReady<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037360\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img loading=\"lazy\" decoding=\"async\" width=\"290\" height=\"130\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right skip-lazy  cvplazy\" alt=\"North Korea IT worker scam\" data-cvpsrc=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2019\/03\/Hackathons-Cybersecurity-290x130.jpg\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/u-s-agencies-seize-four-north-korean-it-worker-scam-websites\/\" class=\"_self cvplbd\" target=\"_self\" >U.S. Agencies Seize Four North Korean IT Worker Scam Websites<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/jeffrey-burt\/\" rel=\"author\">Jeffrey Burt<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-22T09:54:07-05:00\">November 22, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/china-espionage\/' title='china espionage' class='pt-cv-tax-china-espionage'>china espionage<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/department-of-justice-doj\/' title='Department of Justice (DOJ)' class='pt-cv-tax-department-of-justice-doj'>Department of Justice (DOJ)<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/fake-it-worker-scam\/' title='fake IT worker scam' class='pt-cv-tax-fake-it-worker-scam'>fake IT worker scam<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/north-korean-cyber-espionage\/' title='North Korean cyber espionage' class='pt-cv-tax-north-korean-cyber-espionage'>North Korean cyber espionage<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">U.S. law enforcement agencies seized the websites of four North Korean fake IT worker scams that were uncovered by SentinelOne threat researchers and linked to a larger network of Chinese front companies ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\">Security Boulevard<\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037422\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/wrapping-up-a-decade-of-insights-from-the-state-of-the-software-supply-chain\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Wrapping up a decade of insights from the State of the Software Supply Chain\" title=\"\" data-cvpsrc=\"https:\/\/www.sonatype.com\/hubfs\/SSCR-blog-image@2x.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/wrapping-up-a-decade-of-insights-from-the-state-of-the-software-supply-chain\/\" class=\"_self cvplbd\" target=\"_self\" >Wrapping up a decade of insights from the State of the Software Supply Chain<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/aaron-linskens\/\" rel=\"author\">Aaron Linskens<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-21T13:13:06-05:00\">November 21, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/open-source\/' title='open source' class='pt-cv-tax-open-source'>open source<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/secure-software-supply-chain\/' title='secure software supply chain' class='pt-cv-tax-secure-software-supply-chain'>secure software supply chain<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/software-supply-chain\/' title='software supply chain' class='pt-cv-tax-software-supply-chain'>software supply chain<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/state-of-the-software-supply-chain\/' title='State of the Software Supply Chain' class='pt-cv-tax-state-of-the-software-supply-chain'>State of the Software Supply Chain<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Sonatype's 10th annual State of the Software Supply Chain report marks a transformative decade for open source software ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=2024 Sonatype Blog&feed_id=644&blog_url=https:\/\/www.sonatype.com\/blog\">2024 Sonatype Blog<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037545\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/aembit-launches-prometheus-metrics-support\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Aembit Launches Prometheus Metrics Support\" title=\"\" data-cvpsrc=\"https:\/\/aembit.io\/wp-content\/uploads\/2024\/11\/grafana-dashboard-english-1024x572.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/aembit-launches-prometheus-metrics-support\/\" class=\"_self cvplbd\" target=\"_self\" >Aembit Launches Prometheus Metrics Support<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/ashur-kanoon\/\" rel=\"author\">Ashur Kanoon<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T19:57:09-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/devops\/' title='DEVOPS' class='pt-cv-tax-devops'>DEVOPS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/kubernetes\/' title='Kubernetes' class='pt-cv-tax-kubernetes'>Kubernetes<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/product-updates\/' title='Product updates' class='pt-cv-tax-product-updates'>Product updates<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">3 min readEnhance visibility into Aembit Edge deployments with metrics for monitoring performance, detecting anomalies, and integrating with your observability stack. The post Aembit Launches Prometheus Metrics Support appeared first on Aembit ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Aembit&feed_id=1038&blog_url=https:\/\/aembit.io\/\">Aembit<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037150\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/respond-to-fewer-alerts-with-automated-grouping\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container\" target=\"_self\" ><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"pt-cv-thumbnail img-none pull-right cvp-substitute skip-lazy  cvplazy\" alt=\"Screenshot of an event playbook in Smart SOAR showing correlation logic to group alerts related to the same endpoint over a 48-hour period%.\" title=\"\" data-cvpsrc=\"https:\/\/d3security.com\/wp-content\/uploads\/2024\/11\/automated-alert-grouping-3-1024x262.png\" \/><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/respond-to-fewer-alerts-with-automated-grouping\/\" class=\"_self cvplbd\" target=\"_self\" >Respond to Fewer Alerts with Automated Grouping<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/pierre-noujeim\/\" rel=\"author\">Pierre Noujeim<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T18:13:02-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/alert-grouping\/' title='alert grouping' class='pt-cv-tax-alert-grouping'>alert grouping<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/automated-alert-grouping\/' title='automated alert grouping' class='pt-cv-tax-automated-alert-grouping'>automated alert grouping<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/smart-soar\/' title='Smart SOAR' class='pt-cv-tax-smart-soar'>Smart SOAR<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/soar\/' title='SOAR' class='pt-cv-tax-soar'>SOAR<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Smart SOAR\u2019s automated grouping reduces the noise by filtering out irrelevant alerts, enabling a faster and more efficient response. The post Respond to Fewer Alerts with Automated Grouping appeared first on D3 ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=D3 Security&feed_id=1011&blog_url=https:\/\/d3security.com\/\">D3 Security<\/a><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"col-md-12 col-sm-12 col-xs-12 pt-cv-content-item pt-cv-2-col\"  data-pid=\"2037400\"><div class='pt-cv-pinmas'><a href=\"https:\/\/securityboulevard.com\/2024\/11\/a-platform-engineering-guide-to-managing-secrets-with-akeyless\/\" class=\"_self pt-cv-href-thumbnail pt-cv-thumb-right cvplbd cvp-lazy-container cvp-block\" target=\"_self\" ><span class=\"cvp-play\"><\/span><img decoding=\"async\" width=\"290\" src=\"https:\/\/securityboulevard.com\/wp-content\/plugins\/pt-content-views-pro\/public\/assets\/images\/lazy_image.png\" class=\"cvp-videothumb skip-lazy  cvplazy\" alt=\"End-to-end Secure GitOps: Akeyless, ArgoCD, &amp; Port.io\" data-cvpsrc=\"https:\/\/i.ytimg.com\/vi\/sBTYmqyMzzg\/hqdefault.jpg\" \/><iframe title=\"End-to-end Secure GitOps: Akeyless, ArgoCD, &amp; Port.io\" width=\"290\" height=\"163\" data-skip-lazy data-no-lazy class=\"cvp-videothumb\" data-cvpsrc=\"https:\/\/www.youtube.com\/embed\/sBTYmqyMzzg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/a>\n<h4 class=\"pt-cv-title\"><a href=\"https:\/\/securityboulevard.com\/2024\/11\/a-platform-engineering-guide-to-managing-secrets-with-akeyless\/\" class=\"_self cvplbd\" target=\"_self\" >A Platform Engineering Guide to Managing Secrets with Akeyless<\/a><\/h4>\n<div class=\"pt-cv-meta-fields\"><span class=\"author\"> <a href=\"https:\/\/securityboulevard.com\/author\/sam-gabrail\/\" rel=\"author\">Sam Gabrail<\/a><\/span><span> |<\/span><span class=\"entry-date\"> <time datetime=\"2024-11-20T08:00:00-05:00\">November 20, 2024<\/time><\/span><span> |<\/span><span class=\"terms\"> <a href='https:\/\/securityboulevard.com\/tag\/argocd\/' title='ArgoCD' class='pt-cv-tax-argocd'>ArgoCD<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/devops\/' title='DEVOPS' class='pt-cv-tax-devops'>DEVOPS<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/gitops\/' title='GitOps' class='pt-cv-tax-gitops'>GitOps<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/kubernetes\/' title='Kubernetes' class='pt-cv-tax-kubernetes'>Kubernetes<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/platform-engineering\/' title='platform engineering' class='pt-cv-tax-platform-engineering'>platform engineering<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/port-io\/' title='Port.io' class='pt-cv-tax-port-io'>Port.io<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/secrets-management\/' title='Secrets Management' class='pt-cv-tax-secrets-management'>Secrets Management<\/a>, <a href='https:\/\/securityboulevard.com\/tag\/security\/' title='security' class='pt-cv-tax-security'>security<\/a><\/span><\/div>\n<div class=\"pt-cv-content\">Platform engineering equips development teams with efficient and secure workflows to streamline code deployment at scale. This guide explores the essentials of platform engineering, the value of Internal Developer Platforms (IDPs), and ...<\/div>\n<div class=\"pt-cv-ctf-list\" data-cvc=\"2\"><div class=\"col-md-6 pt-cv-ctf-column\"><div class=\"pt-cv-custom-fields pt-cv-ctf-syndication_source\"><div class=\"pt-cv-ctf-value\"><a href=\"https:\/\/securityboulevard.com\/syndication_blog\/?source=Blog | Akeyless&feed_id=1039&blog_url=https:\/\/www.akeyless.io\/blog\/\">Blog | Akeyless<\/a><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<div class=\"text-center pt-cv-pagination-wrapper\"><a href='https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1682908\/?_page=2' onclick='event.preventDefault()' class=\"pt-cv-more btn btn-primary btn-sm\" data-totalpages=\"50\" data-nextpages=\"2\" data-sid=\"63f1e1bp89\" data-unid=\"c04984fc3ce309e8c30121f15f78e8ea\" data-isblock=\"\" data-postid=\"\">Load more <span class=\"caret\"><\/span><\/a><img loading=\"lazy\" decoding=\"async\" width=\"15\" height=\"15\" class=\"pt-cv-spinner\" alt=\"Loading...\" src=\"data:image\/gif;base64,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\" \/><div class=\"clear pt-cv-clear-pagination\"><\/div><\/div><\/div>\t\t\t<style type=\"text\/css\" id=\"pt-cv-inline-style-9ede2d4tqv\">#pt-cv-view-63f1e1bp89 .pt-cv-content-item { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89  { margin-right: 3px !important; margin-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-pinmas { padding-left: 3px !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-title a, #pt-cv-view-63f1e1bp89  .panel-title { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 20px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89  .pt-cv-title a:hover, #pt-cv-view-63f1e1bp89  .panel-title:hover   { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-content , #pt-cv-view-63f1e1bp89  .pt-cv-content *:not(.pt-cv-readmore):not(style):not(script) { font-family: 'Source Sans Pro', Arial, serif !important; font-size: 16px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields .glyphicon {font-family: 'Glyphicons Halflings' !important; line-height: 1 !important;}\n#pt-cv-view-63f1e1bp89 .pt-cv-meta-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-custom-fields * { font-family: 'Roboto', Arial, serif !important; font-size: 12px !important; line-height: 1.3 !important; display: block !important; text-align: left !important; clear: both !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }\n#pt-cv-view-63f1e1bp89 .pt-cv-readmore:hover  { font-family: 'Roboto', Arial, serif !important; color: #ffffff !important; background-color: #00aeef !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more-inactive , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination a, .pt-cv-pagination[data-sid='63f1e1bp89'] a { font-family: 'Source Sans Pro', Arial, serif !important; }\n#pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pt-cv-more , #pt-cv-view-63f1e1bp89  + .pt-cv-pagination-wrapper .pagination .active a, .pt-cv-pagination[data-sid='63f1e1bp89'] .active a { font-family: 'Source Sans Pro', Arial, serif !important; color: #ffffff !important; background-color: #6190bb !important; }<\/style>\r\n\t\t\t<link href='\/\/fonts.googleapis.com\/css?family=Source+Sans+Pro' rel='stylesheet' type='text\/css'><link href='\/\/fonts.googleapis.com\/css?family=Roboto' rel='stylesheet' type='text\/css'>]<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>DevOps Security<\/p>\n","protected":false},"author":6042,"featured_media":1354613,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-1682908","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.9 (Yoast SEO v23.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DevOps Security - Security Boulevard<\/title>\n<meta name=\"description\" content=\"Just like DevOps, DevSecOps is about greater efficiency and productivity through team collaboration but with security practices integrated.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securityboulevard.com\/devops\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DevOps Security\" \/>\n<meta property=\"og:description\" content=\"DevOps Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securityboulevard.com\/devops\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Boulevard\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/groups\/24445075146\/\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-06T19:16:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto17714637.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@securityblvd\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securityboulevard.com\/devops\/\",\"url\":\"https:\/\/securityboulevard.com\/devops\/\",\"name\":\"DevOps Security - Security Boulevard\",\"isPartOf\":{\"@id\":\"https:\/\/securityboulevard.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securityboulevard.com\/devops\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securityboulevard.com\/devops\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto17714637.jpg\",\"datePublished\":\"2017-10-09T22:59:27+00:00\",\"dateModified\":\"2019-03-06T19:16:59+00:00\",\"description\":\"Just like DevOps, DevSecOps is about greater efficiency and productivity through team collaboration but with security practices integrated.\",\"breadcrumb\":{\"@id\":\"https:\/\/securityboulevard.com\/devops\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securityboulevard.com\/devops\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/securityboulevard.com\/devops\/#primaryimage\",\"url\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto17714637.jpg\",\"contentUrl\":\"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto17714637.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securityboulevard.com\/devops\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securityboulevard.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DevOps Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securityboulevard.com\/#website\",\"url\":\"https:\/\/securityboulevard.com\/\",\"name\":\"Security Boulevard\",\"description\":\"The Home of the Security Bloggers Network\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securityboulevard.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"DevOps Security - Security Boulevard","description":"Just like DevOps, DevSecOps is about greater efficiency and productivity through team collaboration but with security practices integrated.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securityboulevard.com\/devops\/","og_locale":"en_US","og_type":"article","og_title":"DevOps Security","og_description":"DevOps Security","og_url":"https:\/\/securityboulevard.com\/devops\/","og_site_name":"Security Boulevard","article_publisher":"https:\/\/www.facebook.com\/groups\/24445075146\/","article_modified_time":"2019-03-06T19:16:59+00:00","og_image":[{"width":800,"height":600,"url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto17714637.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@securityblvd","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/securityboulevard.com\/devops\/","url":"https:\/\/securityboulevard.com\/devops\/","name":"DevOps Security - Security Boulevard","isPartOf":{"@id":"https:\/\/securityboulevard.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securityboulevard.com\/devops\/#primaryimage"},"image":{"@id":"https:\/\/securityboulevard.com\/devops\/#primaryimage"},"thumbnailUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto17714637.jpg","datePublished":"2017-10-09T22:59:27+00:00","dateModified":"2019-03-06T19:16:59+00:00","description":"Just like DevOps, DevSecOps is about greater efficiency and productivity through team collaboration but with security practices integrated.","breadcrumb":{"@id":"https:\/\/securityboulevard.com\/devops\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securityboulevard.com\/devops\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/securityboulevard.com\/devops\/#primaryimage","url":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto17714637.jpg","contentUrl":"https:\/\/securityboulevard.com\/wp-content\/uploads\/2017\/07\/canstockphoto17714637.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/securityboulevard.com\/devops\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securityboulevard.com\/"},{"@type":"ListItem","position":2,"name":"DevOps Security"}]},{"@type":"WebSite","@id":"https:\/\/securityboulevard.com\/#website","url":"https:\/\/securityboulevard.com\/","name":"Security Boulevard","description":"The Home of the Security Bloggers Network","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securityboulevard.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P91vu9-73NG","_links":{"self":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1682908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/users\/6042"}],"replies":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/comments?post=1682908"}],"version-history":[{"count":0,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/pages\/1682908\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media\/1354613"}],"wp:attachment":[{"href":"https:\/\/securityboulevard.com\/wp-json\/wp\/v2\/media?parent=1682908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}