DevSecOps
Where DevOps Pipelines Break: Real Attack Paths in Cloud-Native CI/CDÂ
While traditional security focuses on perimeters, modern attackers are moving upstream to the CI/CD pipeline. By compromising the build process rather than the final product, they can inject malicious code into trusted ...
Java Code Isn’t the Problem – The Container IsÂ
Learn how integrating Docker Scout into Java CI pipelines shifts container security left, replacing manual reviews with automated gates to secure base images and dependencies ...
OWASP Has Adopted DockSec and the Cloud Security Community Is Taking Notice
With more than 13,000 downloads across more than 40 countries, DockSec has earned its place as an OWASP Incubator Project by doing something most container security tools have not managed: closing the ...
CleanStart Takes Aim at BusyBox to Harden Container Security
Container security faces a significant "inheritance risk" through BusyBox, a legacy utility package embedded in popular base images. CleanStart addresses this with a new BusyBox-free container architecture, replacing inherited userspace utilities with ...
The New Multi-Tenant Challenge: Securing AI Agents in Cloud-Native Infrastructure
AI agents run untrusted code. Here’s how to secure them using isolation, least privilege and proven cloud-native patterns ...
Survey Surfaces Raft of Container Security Challenges
A BellSoft survey reveals gaps in container security practices, showing that human error, limited vulnerability scanning, and infrequent patching continue to expose cloud-native environments to risk ...
Best of 2025: DevSecOps for Kubernetes: 15 Best Practices for 2025
In today’s environment, it is becoming harder to build secure applications. Applications are becoming increasingly complex, relying on more and more dependencies and components provided by vendors than ever before. These components ...
Docker, Inc. Adds More Than a Thousand Free Hardened Container Images
Docker is releasing more than 1,000 hardened container images under an open source license, aiming to cut vulnerabilities and strengthen software supply chains ...
5 Reasons Cloud-Native Companies Should Start Adopting Quantum-Safe Security Today
Quantum computing threatens today’s encryption. Learn why cloud-native organizations must adopt quantum-safe security to stay compliant and resilient ...
Carl Torrence | | API security, cloud encryption, cloud native security, cloud-native DevOps, container security, cybersecurity compliance, data protection, DevSecOps, future-proof encryption, microservices security, multi-cloud security, NIST PQC standards, post-quantum cryptography, PQC, quantum computing risks, quantum resilience, quantum risk mitigation, quantum-safe encryption, quantum-safe security, regulatory compliance
The Future of Cloud-Native DevOps, DataOps, FinOps and BeyondÂ
Explore how cloud-native DevOps, DataOps, and FinOps are shaping the future of scalable, automated, and intelligent cloud application development ...
Joydip Kanjilal | | agile cloud development, AI and ML in DevOps, AIOps, automation in cloud, CI/CD pipelines, cloud computing trends, cloud-native applications, cloud-native DataOps, cloud-native DevOps, cloud-native FinOps, cloud-native software delivery, cloud-native strategy, cloud-native transformation, containerization, DevSecOps, edge computing, enterprise cloud optimization, future of DevOps, GitOps, infrastructure as code, intelligent cloud platforms, kubernetes, microservices architecture, platform engineering, scalable cloud apps, serverless computing

