Latest Blogs About "DevSecOps"

103 total posts.

5 Min Read
My Journey in Scala, Part 2: Tips for Using IntelliJ IDEA

Joe Baker

July 19, 2016

After spending significant time in dynamic languages, learning Scala can be challenging, so having the right tools (like IntelliJ) at your fingertips ...

5 Min Read
My Journey in Scala, Part 1: Awakenings

Joe Baker

July 12, 2016

When I started at Threat Stack over a year ago, I came in as a Platform Engineer expecting to work on JavaScript. I had no idea that Threat Stack ...

11 Min Read
Scala @ Scale, Part 1: Leaving Unhandled Errors Behind

Dave Hagman

July 5, 2016

The number of organizations investing in Scala is exploding, and for good reason. Scala combines Object Oriented and Functional capabilities as well ...

3 Min Read
Who is Responsible for a Security Breach?

Threat Stack Marketing Team

June 30, 2016

Before you can assign responsibility for a security breach, you need to go back to the scene of the crime and understand where it originated. No easy ...

3 Min Read
How to Apply DevOps Culture to Security & Why You Should Do It

Pete Cheslock

June 17, 2016

Unless you’ve been living under a rock (or don’t work in the tech industry), you’ve probably heard the term DevOps thrown around. A mashup of ...

3 Min Read
How to Ensure Simple and Efficient Security Deployments

Tom McLaughlin

June 10, 2016

On the heels of the recent announcement that Threat Stack has joined the Chef Partner Cookbook Program, it’s a good time to talk about some of the ...

4 Min Read
What to Do When You Can’t Fix a Security Vulnerability

Pete Cheslock

June 2, 2016

When you discover a security vulnerability affecting your environment, you want to fix it. Quick. ...

6 Min Read
Why Did We Need to Invent DevSecOps?

Tom McLaughlin

June 1, 2016

While the term "DevSecOps" has started to come up more often recently, we’re still wrapping our heads around “DevOps” to answer questions such ...

5 Min Read
Using webpack Build System in Existing Codebases

Vitaliy Zakharov

May 24, 2016

There are many tutorials, blog posts, and articles in the internets that deal with using cool and shiny new tools in cool and shiny new projects. As ...

2 Min Read
What’s on the Box!? An In-depth Look At OS Package Management

Lucas DuBois

March 29, 2016

Recently, I had the opportunity to help build out our vulnerability detection feature here at Threat Stack. I stepped into this project as I had many ...

3 Min Read
What All DevOps Teams Should Know About The AWS Shared Responsibility Model

Sam Bisbee

June 10, 2015

Keeping your cloud workloads secure, compliant, and protected while moving at the speed of DevOps is no easy task. Our team at Threat Stack knows ...

5 Min Read
Who Watches the Watchmen? Securing Configuration Management Systems

Jen Andre

February 24, 2015

This is part of a series we’re calling ‘Securing Modern Infrastructure’, where we explore the implications of modern development and operations ...

4 Min Read
The 12 Days of SecDevOps

Jen Andre

December 24, 2014

(Note: The full version of this post is on the SysAdvent blog. Below is a summary.) ...

4 Min Read
The Linux “Grinch” Vulnerability: Separating Fact From FUD

Jen Andre

December 18, 2014

Recently, a security firm reported what they claimed to be a flaw with a major impact on organizations running Linux. (And apparently since all the ...

4 Min Read
4 Steps To Effectively Integrate DevOps Workflows With Cloud Security Practices

Pete Cheslock

November 24, 2014

I’ve spent most of my career in Operations, and the last 5 years at various organizations advocating and instilling DevOps principles in the teams ...

5 Min Read
Bringing Infosec Into The DevOps Tribe: Q&A With Gene Kim

Pete Cheslock

October 8, 2014

Last week, I had a call with Gene Kim, founding CTO of Tripwire and author of The Phoenix Project (see end of post for more details). I've known ...

4 Min Read
8 Patterns For Continuous Code Security

Chris Wysopal

August 6, 2014

Guest post by Chris Wysopal, CTO at Veracode  ...

3 Min Read
Who Gets Access to Production?

Sam Bisbee

July 23, 2014

This is the third installment in our new series of weekly blog posts that dives into the role of SecDevOps. This series looks into why we need it in ...

4 Min Read
The Case for Continuous Security

Pete Cheslock

July 16, 2014

This is the second post in our new series of weekly blog posts that dives into the role of SecDevOps. This series looks into why we need it in our ...