Security Engineering Blog

AppSec & DevSecOps.
Written for engineers.

Deep technical dives on application security, infrastructure scanning, SAST, secrets management, and the mechanics of building secure software pipelines — no marketing fluff.

All IaC Security SAST Secrets DevSecOps SCA Container AppSec AI & Remediation
IaC Security Terraform CI/CD

Terraform Git Source Modules: The IaC Vulnerability Your Scanner Never Reaches

Most IaC scanners run against your working directory — but Terraform modules sourced from Git are fetched at terraform init time, in the wrong place, or never at all.

SCA JavaScript npm

npm audit Says You're Clean. Your /static/vendor/ Folder Disagrees.

npm audit only reads your lockfile. It has no idea about the jQuery 1.11 sitting in your static folder since 2015. Here is what it misses and how to actually find it.

SAST GitHub Actions

Why SAST Misses Vulnerabilities Introduced via GitHub Actions Expressions

Untrusted input flowing through ${{ github.event.issue.title }} into shell commands is a class of injection that static analysers routinely overlook.

Secrets Git History

Secrets That Outlive Their Rotation: Git History as a Credential Store

Rotating a leaked key in your current branch does nothing to the commit SHA where it lived. Here is how attackers recover rotated secrets from public repositories — and how to actually remediate.

SCA Supply Chain

Transitive Dependency Confusion: How SCA Tools Miss the Real Risk in Deep Dependency Trees

A CVE in a direct dependency gets patched. The vulnerable version stays in your lockfile via an indirect transitive path your scanner never flags.

Container DevSecOps

Container Escape via Misconfigured Kubernetes Admission Controllers

Admission webhooks that fail-open during outages create a narrow window where unsigned, unscanned images bypass your entire security policy chain.

AppSec OWASP

Prototype Pollution in Node.js: Why Your SAST Rules Are Ten Years Behind the Exploitation Techniques

Modern prototype pollution chains through gadgets in popular frameworks in ways that rule-based SAST engines simply cannot model. Here is the gap.

Container Secrets

Docker Image Layers Store Every Secret You Ever ADD-ed: How docker history Recovers Deleted Credentials

RUN rm .env doesn't remove the secret from the image — it just hides it behind a whiteout file. Every previous layer is still there, still readable. Here is the extraction proof and the correct fix.

AppSec OWASP A10

SSRF to AWS Credential Theft via IMDSv1: One HTTP Request from Full Account Takeover

SSRF against 169.254.169.254 hands attackers temporary IAM credentials — no authentication required. Complete exploit chain, IMDSv2 limitations, and how to actually block it.

AppSec Auth

JWT Algorithm Confusion: How alg:none and RS256→HS256 Downgrade Break Authentication

Three JWT attack classes that still work in production codebases: the alg:none bypass, the RS256-to-HS256 confusion attack using the public key as the HMAC secret, and kid parameter injection.

SCA Supply Chain

Your SBOM Is a Compliance Artifact, Not a Security Tool: How to Actually Operationalize It

Generating a CycloneDX or SPDX SBOM checks the compliance box. Using it for continuous vulnerability management is a different problem. VEX integration, policy-as-code gates, and diff-based alerting — the full operational model.

DevSecOps Supply Chain CI/CD

CI/CD Pipeline Poisoning: How Attackers Turn Your Build System into a Supply Chain Attack Vector

Your CI/CD pipeline runs untrusted code with access to production secrets. Malicious pull requests, mutable Action tags, cache poisoning, and self-hosted runner compromise — the complete threat model and hardening checklist.

Malware Git Detection

How to Find Malware in a Git Repository

Step-by-step techniques to detect malicious code, obfuscated scripts, and embedded binaries in Git repos — using grep, YARA, ClamAV, Trivy, and git log forensics.

SAST CI/CD DevSecOps

How to Run SAST in Your CI/CD Pipeline

Set up static analysis with Semgrep, CodeQL, and Bandit in GitHub Actions and GitLab CI. Learn how to block builds on high-severity findings and reduce false positives.

Docker CVE DevSecOps

How to Scan Docker Images for Vulnerabilities

Compare Trivy, Grype, and Docker Scout for container image scanning. Includes CI gate patterns, SBOM generation, and base image hardening strategies.

Secrets Security Tools

How to Find Hardcoded Secrets in Your Codebase

Detect leaked API keys, tokens, and credentials using grep patterns, Trufflehog, and Gitleaks. Set up pre-commit hooks and CI gates to prevent future leaks.

SBOM Compliance Supply Chain

What Is an SBOM? Software Bill of Materials Explained

Plain-English guide to Software Bills of Materials: what they are, why Log4Shell made them essential, the difference between CycloneDX and SPDX, and how to generate one today.

OWASP AppSec Developer Guide

OWASP Top 10 Explained: A Developer's Guide with Code Examples

All 10 OWASP Top 10 (2021) vulnerabilities explained with real vulnerable code, working exploits, and fixed versions — from injection and broken auth to SSRF and supply chain risks.

SAST IDE Shift Left

Why Scanning Code in the IDE is Needed

CI/CD scanning catches vulnerabilities minutes before merge. IDE scanning catches them seconds after they are written. The feedback loop difference changes developer behaviour permanently.

AppSec Enterprise DevSecOps

How to Scale Security Scanning Across 10,000 Repositories

At a handful of repos, scanning is a CI config problem. At ten thousand, it is a distributed systems problem. Architecture, tooling, and process strategies for enterprise-scale AppSec.

CI/CD GitHub GitLab

How to Integrate Security Scanners in GitLab and GitHub

Practical guide to SAST, SCA, secrets scanning, and IaC integration in GitHub Actions and GitLab CI — with real configuration examples and security gate patterns that actually block.

SCA Supply Chain Open Source

SCA vs Dependency Scanning: What Is the Difference?

"SCA" and "dependency scanning" are used interchangeably in vendor marketing — but they describe different scopes. Understanding the difference determines whether your programme covers what you think.

AI Security SAST AppSec

Why Vibe Coding Introduces New Security Vulnerabilities

LLMs generate code that looks correct but is often insecure. Hardcoded secrets, SQL injection via string interpolation, disabled SSL verification — the specific patterns AI code generators produce.

Secrets PII IDE

Why Secret and PII Scanning Must Happen in the IDE, Not Just CI/CD

By the time a secret reaches CI/CD, it has already been committed to Git history. Git history is permanent. Secret and PII scanning must happen before the first commit.

IaC Security Terraform DevSecOps

How to Scan Infrastructure via IaC Scanners

IaC scanners apply static analysis to Terraform, CloudFormation, Kubernetes manifests, and Dockerfiles — catching misconfigurations before infrastructure is provisioned. Tools, techniques, and CI/CD patterns.

OWASP SAST Compliance

Can OWASP Top 10 Compliance Be Achieved with SAST Alone?

SAST covers some OWASP categories well and others not at all. A detailed breakdown of which require DAST or SCA — and what a complete OWASP compliance programme actually looks like.

AppSec DevSecOps Tools

The Different Types of Code Security Scanners Explained

SAST, DAST, IAST, SCA, secrets, IaC, container, malware — every scanner type explained in plain English, with what each finds, what it misses, and when to use it.

DAST AppSec Runtime

Why DAST is Essential for Software Security

DAST finds vulnerabilities SAST cannot — DOM-based XSS, auth bypass, race conditions, session fixation — because it tests the actual running application. How to integrate DAST into your pipeline.

AI Coding Copilot Comparison

Can Writing Code with AI Help? The Best AI Coding Providers

Copilot, Cursor, Claude, GPT-4o, Gemini — compared on code quality, security awareness, context handling, and real-world productivity. Which AI coding assistant is best for security-conscious teams?

Security Risk Vibe Coding SAST

Is Vibe Coding Good for Security?

Vibe coding ships products fast — but does it ship secure products? An evidence-based assessment of the vulnerability patterns AI-generated code introduces and how to mitigate them.

IaC Terraform AI DevOps

What AI Can Do to Terraform and Infrastructure Deployment

AI generates Terraform modules, reviews drift, and automates deployments — but introduces new IaC security risks. What is genuinely useful, what is dangerous, and how to keep AI-generated infrastructure secure.

AI Security Vibe Coding SAST

Can AI Build an Entire App? Security Cost and Hidden Risks

AI can scaffold a full application in under an hour. But the security debt it creates — BOLA, hardcoded secrets, broken auth — can take months to pay down. How to measure the real cost.

Vibe Coding AI Development Engineering

Why People Are Not Using Vibe Coding for Everything

AI coding is transformative but experienced engineers use it selectively. Context windows, edge cases, security blind spots, and maintainability debt — the real limits of AI-first development.

DevSecOps AI Development SDLC

A Perfect SDLC Using AI

AI can accelerate every phase of the SDLC — from requirements and threat modelling to code review and deployment — without sacrificing security. A practical blueprint for AI-augmented secure development.

AI Attacks LLM Security Threat Intel

Cyber Attacks in Relation to AI Models

Prompt injection, training data poisoning, model extraction, adversarial examples, supply chain attacks — the attack classes that target AI systems and how to defend against them.

Code Review AI Detection Security Audit

How to Identify If Code Is Written by AI

AI-generated code has distinctive structural, stylistic, and security patterns. Learn how to detect it in your codebase and why knowing changes how you should approach security review.

AppSec SQL Injection SAST

What Is SQL Injection? How It Works and How to Stop It

SQL injection is still one of the most exploited vulnerabilities on the web. Learn how attackers use it to dump databases, bypass auth, and take over servers — and how parameterized queries stop it cold.

AppSec XSS OWASP

What Is XSS? Cross-Site Scripting Types, Examples, and Prevention

Reflected, stored, and DOM-based XSS all let attackers run JavaScript in your users' browsers. Here's how each variant works, with real payloads, and why Content Security Policy is your best defence.

AppSec IDOR OWASP #1

Broken Access Control and IDOR Explained

Broken access control is the #1 vulnerability on the OWASP Top 10. Learn how IDOR (Insecure Direct Object Reference) attacks work, why automated scanners miss them, and how to add server-side ownership checks.

API Security JWT OWASP API

API Security Testing: The Complete Guide

APIs are the attack surface that keeps growing. This guide covers the OWASP API Top 10, JWT algorithm confusion, mass assignment, and how to automate API security testing in your CI/CD pipeline.

AI Security LLM Prompt Injection

Prompt Injection Attacks: The Top Risk for AI Apps

Prompt injection is the new SQL injection — and most teams building AI features don't know they're already vulnerable. Learn how direct and indirect injection work in LLM-powered apps and how to defend against them.

Supply Chain SCA SBOM

Software Supply Chain Attacks Explained

SolarWinds, Log4Shell, XZ Utils — supply chain attacks are on the rise. Here's exactly how dependency confusion, typosquatting, and build system compromise work, and what SBOMs actually help with.

Container DevSecOps Docker

Docker Container Security: What Most Teams Get Wrong

Running containers as root, using outdated base images, storing secrets in ENV vars — these are the mistakes that turn a Docker deployment into a breach. Learn what to fix and how to scan for it automatically.

Secrets AppSec Git

Hardcoded Secrets and API Keys: Still the #1 Breach Cause

Hardcoded API keys and passwords committed to Git repositories cause some of the biggest breaches every year. Learn how attackers find them, why rotating isn't enough, and how pre-commit hooks and vaults prevent them.

Zero Trust Architecture IAM

Zero Trust Security Model Explained

"Never trust, always verify" is more than a slogan — it's a complete architectural shift. This guide explains the three pillars of Zero Trust, how micro-segmentation works, and what a real implementation roadmap looks like.

Cloud Security AWS IaC

Cloud Misconfigurations: The Breach Vector Nobody Talks About

Open S3 buckets, IAM wildcard permissions, public RDS snapshots — cloud misconfiguration causes more breaches than zero-days. Learn the most dangerous misconfigs, how attackers find them in minutes, and how CSPM tools help.

DevSecOps CI/CD Shift Left

What Is DevSecOps? Shift-Left Security Explained

Fixing a vulnerability in production costs 30x more than fixing it during development. DevSecOps is about embedding security into every stage of the pipeline — here's exactly how to do it with real GitHub Actions YAML examples.

Ransomware AppSec Threat Modelling

How Ransomware Works and What Developers Can Do

Ransomware isn't just an IT problem — it's a software security problem. Learn the attack kill chain from initial access to encryption, how double extortion works, and the specific developer practices that reduce your blast radius.

Pen Testing AppSec DAST

What Is Penetration Testing? A Developer's Guide

Pen testing isn't the same as vulnerability scanning. This guide explains the difference, walks through the five phases of a real penetration test, and shows how automated DAST tools bridge the gap for teams without a red team.

Scanning CVSS SCA

Vulnerability Scanning and CVSS Scores Explained

A CVSS 9.8 score doesn't always mean "fix immediately" — context matters. This guide explains how CVSS scoring works, what EPSS adds, and how to prioritise a backlog of hundreds of CVEs without burning out your team.

CSRF AppSec OWASP

CSRF Attacks Explained: Cross-Site Request Forgery

CSRF tricks authenticated users into making requests they never intended. Learn how the attack works step by step, why it bypasses traditional auth, and how SameSite cookies and CSRF tokens are your two-line fix.

OWASP A02 Cryptography AppSec

Cryptographic Failures: What You're Getting Wrong

OWASP A02 isn't about accidentally exposing data — it's about shipping broken or missing cryptography. MD5 passwords, hardcoded keys, verify=False in HTTP clients, ECB mode. Here's what to actually fix.

OWASP A05 Misconfiguration Cloud Security

Security Misconfiguration: The Vulnerability You Ship by Default

Debug mode on, default credentials, exposed admin panels, missing security headers — security misconfiguration is the most common vulnerability OWASP records and the easiest to prevent with the right automation.

XXE Injection OWASP

XXE Injection: How It Works and How to Block It

XXE exploits insecure XML parsers to read server files, trigger SSRF, and exfiltrate data out of band via DNS. If your app processes XML — SOAP, SVG uploads, document imports — and you haven't hardened your parser, you're likely vulnerable.

Deserialization RCE AppSec

Insecure Deserialization: The Vulnerability That Gives Attackers RCE

Pickle.loads with user input, Java ObjectInputStream without filters, PHP unserialize — these don't just crash your app. They hand an attacker a shell. Here's how gadget chains work and how to eliminate the risk.

Path Traversal Injection Web Security

Path Traversal: Reading Files You Were Never Meant to Access

../../../etc/passwd is the obvious payload — but URL encoding, double encoding, and null bytes bypass naive filters. The fix isn't filtering dots; it's canonicalising the path and verifying it stays inside your base directory.

Command Injection RCE OWASP

Command Injection: When Your App Becomes a Terminal for Attackers

shell=True with user input. exec() with a template string. These are how command injection happens — and the fix is using subprocess list form, not trying to escape metacharacters. Here's everything you need to know.

OWASP A07 Authentication Session Security

Broken Authentication: Why Login Systems Keep Getting Pwned

Credential stuffing works because users reuse passwords. Weak session IDs are enumerable. Predictable reset tokens are brute-forceable. This post covers the full spectrum of authentication failures and what modern apps should do instead.

API Security OWASP API REST Security

OWASP API Security Top 10: Every Risk Explained

BOLA is the number one API vulnerability — and it's just a missing user ownership check. Mass assignment sets fields attackers shouldn't touch. This guide walks through all 10 OWASP API risks with concrete code examples.

Business Logic AppSec OWASP

Business Logic Vulnerabilities: The Bugs Scanners Almost Never Find

Negative quantities that trigger refunds. Race conditions that let a coupon be used twice. Workflow steps you can skip to get premium access for free. These flaws are syntactically correct code implementing the wrong rules.

Clickjacking Web Security Security Headers

Clickjacking Attacks Explained: How One Header Fixes It

Clickjacking layers your site in a transparent iframe and tricks users into clicking things they can't see. X-Frame-Options or CSP frame-ancestors stops it completely. Here's how the attack works and why JavaScript frame-busting doesn't cut it.

AI Security DevSecOps IDE

AI Security Copilots in the IDE: Real-Time Vulnerability Feedback That Actually Works

63% of security teams are using AI copilots for real-time security feedback in developer IDEs. Here's how these tools work under the hood, which vulnerability patterns they catch reliably, and how to integrate them without killing developer velocity.

API Security Authentication Zero Trust

Beyond Bearer Tokens: DPoP and mTLS for Token-Theft-Proof APIs

Bearer tokens are stolen and replayed every day. Sender-constrained tokens with DPoP and mTLS bind credentials to the client — a stolen token is useless without the private key. Learn how to implement both.

Supply Chain SLSA Sigstore

Software Supply Chain Security Beyond SBOMs: Sigstore, SLSA, and Build Provenance

SBOMs tell you what's in your software. Sigstore, SLSA, and in-toto attestations tell you whether it was tampered with. After the GhostAction attack in 2025, provenance verification is no longer optional.

OWASP AppSec 2025

OWASP Top 10 2025: What's New, What Changed, and What You Need to Fix

Security Misconfiguration jumps to #2, a brand new A10 Exceptional Conditions category appears, and the data methodology changed. Here's the full breakdown of what's different in the 2025 edition and what your programme needs to update.

AI Code SAST DevSecOps

Scanning AI-Generated Code: Why Your SAST Rules Need an Upgrade

70% of enterprise codebases now contain AI-generated code. Copilot and other LLMs reliably get cryptography, error handling, and injection wrong in ways that classic SAST rules aren't tuned to catch. Here's what to do about it.

AI Security MCP DevSecOps

Shadow MCP: The New Security Risk of Unvetted AI Agent Tools

Employees are deploying Model Context Protocol servers without IT oversight, giving AI agents access to production databases, file systems, and APIs. Shadow MCP is 2026's shadow IT problem — and it's already in your environment.

RASP WAF Runtime Security

RASP vs WAF: Why Runtime Protection Is the Layer You're Missing

WAFs guard the perimeter but they can't see inside your running application. Runtime Application Self-Protection instruments your code to block exploits from within — catching zero-days that WAF signatures will never catch.

Log Security Injection OWASP A09

Log Injection: How Attackers Forge Audit Trails and Cover Their Tracks

Log injection lets attackers write fake log entries — making it look like they were never there, or framing other users. With CVEs in Django and Envoy Gateway in 2025, this underestimated attack class deserves a proper look.

Cryptography Post-Quantum AppSec

Post-Quantum Cryptography: Why You Need to Start Migrating Your Apps Now

Quantum computers will break RSA and ECC. The harvest-now-decrypt-later threat is real today — adversaries are recording encrypted traffic now to decrypt later. NIST finalised its post-quantum standards in 2024. Here's your migration guide.

Kubernetes RBAC Container Security

Kubernetes RBAC Misconfigurations: The Cluster Takeover Cheat Sheet

Overpermissive RBAC is the #1 way attackers escalate from a compromised pod to full cluster ownership. Here are the wildcard traps, dangerous permission combinations, and privilege escalation chains we find in almost every Kubernetes assessment.

OAuth Authorization AppSec

OAuth 2.0 Security Vulnerabilities: The Authorization Framework That Keeps Getting Misconfigured

OAuth 2.0 is everywhere but almost nobody implements it correctly. Open redirects steal auth codes, missing state parameters enable CSRF, tokens leak in referrer headers, and PKCE implementations have bypassable edge cases.

AI Remediation Auto-Fix DevSecOps

AI-Powered Auto-Remediation: Fix Security Vulnerabilities Automatically at Scale

AI remediation engines are now generating merge-ready patches from scanner findings. How they work, what they get right, what they get dangerously wrong, and how to build an approval gate that keeps humans in the loop.

AI Security LLM Pull Requests

LLMs That Write Your Security Fix PRs: What Works and What to Verify

GPT-4o, Claude, and Gemini can generate security remediation pull requests from vulnerability reports. The output looks convincing — but the correctness rate varies wildly by vulnerability class. Here's the data.

SAST AI Triage DevSecOps

Using AI to Triage SAST False Positives Without Burning Out Your Security Team

Most SAST findings are noise. AI triage classifiers trained on your codebase context can suppress false positives with 90%+ precision — here's how to build and validate one without introducing blind spots.

AI Agents CI/CD Auto-Remediation

Agentic Security: Self-Healing CI/CD Pipelines That Fix Their Own Vulnerabilities

Autonomous security agents can detect a vulnerability, understand its context, generate a fix, open a PR, and monitor the deployment — without human intervention. The architecture, risks, and guardrails you need.

SCA AI Remediation Supply Chain

AI-Driven Dependency Remediation: Beyond npm audit fix

npm audit fix blindly upgrades. AI remediation understands breaking change risk, API compatibility, and test coverage before proposing a version bump. The difference matters at scale.

AI Remediation CVE Automation

Remediation as Code: AI Turns CVE Findings Into Merge-Ready Pull Requests

From a raw CVE identifier to a reviewed, tested, merge-ready pull request — entirely driven by AI. The pipeline design, the LLM prompting strategy, and the human-in-the-loop checkpoints you must never skip.

Threat Modelling AI Security STRIDE

AI Threat Modelling and Automated Remediation: From Threat to Patch

AI can generate a STRIDE threat model from an architecture diagram and then produce prioritised remediation recommendations — closing the gap between threat identification and actual code fixes.

SOAR AI Agents SecOps

AI-Driven Security Orchestration: Replacing Manual SOAR Playbooks with Autonomous Agents

Traditional SOAR playbooks require months of manual authoring and break whenever environments change. AI agents that understand intent, not just rules, can replace brittle playbooks with adaptive response.

DevSecOps Auto-Remediation CI/CD

Continuous Auto-Remediation: The Zero-Backlog DevSecOps Model

Security backlogs grow because findings arrive faster than engineers can remediate them. Continuous auto-remediation flips the model — every finding triggers an automated fix attempt before it reaches the backlog.

IaC Security Terraform AI Auto-Fix

AI Auto-Fixing IaC Misconfigurations: From tfsec Finding to Merged PR

tfsec flags an open security group. An AI agent understands the intent of the resource, generates a least-privilege fix, validates it with terraform plan, and opens a PR — in under two minutes.

Secrets AI Remediation Automation

LLM-Assisted Secret Detection and Auto-Rotation in CI/CD

Detecting a leaked secret is the easy part. Rotating it, updating all consumers, and re-deploying without downtime is the hard part. AI agents can orchestrate the full rotation workflow — here's how.

CVSS AI Prioritisation EPSS

AI Vulnerability Prioritisation: Using EPSS and LLMs to Focus Remediation Effort

CVSS scores tell you theoretical severity. EPSS predicts exploitation probability. LLMs understand your codebase context. Combining all three produces a remediation queue that matches real-world risk — not spreadsheet risk.

GitHub Actions CI/CD Automation

GitHub Actions: What It Is and How to Use It

GitHub Actions turns your repository into a fully automated CI/CD platform. Learn how workflows, jobs, steps, and triggers work — and how to build your first pipeline from scratch.

GitLab CI/CD Jobs

GitLab CI/CD Jobs: A Complete Guide

GitLab CI/CD jobs are the atomic units of your pipeline. Learn how to configure stages, jobs, artifacts, caching, and rules in .gitlab-ci.yml — from first pipeline to advanced patterns.

Security CI/CD DevSecOps

CI/CD and Security: Building a Secure Pipeline

Your CI/CD pipeline is where shift-left security happens. Learn how to integrate SAST, SCA, secret scanning, container scanning, and DAST into your delivery pipeline — without slowing teams down.

DevSecOps Architecture AppSec

The Ideal DevSecOps Solution: What to Look For

What separates a mature DevSecOps platform from a collection of scanning tools? This guide breaks down the capabilities, integrations, and cultural practices that define an ideal DevSecOps solution.

Jenkins Security CI/CD

Jenkins and CI/CD Security: Hardening Your Pipeline

Jenkins is powerful but exposes significant attack surface when misconfigured. Learn how to harden Jenkins controllers, secure credentials, lock down plugins, and integrate security scanning into Jenkinsfiles.

Secure SDLC DevSecOps Architecture

The Ideal Secure SDLC: A Phase-by-Phase Guide

A mature Secure SDLC embeds security at every phase — design, development, testing, and deployment. Here is what each phase looks like when security is genuinely integrated rather than bolted on.

Secure SDLC DevSecOps Comparison

Secure SDLC vs DevSecOps: What's the Difference?

Secure SDLC and DevSecOps are often used interchangeably — but they represent different eras of thinking about software security. Here is how they differ and how they relate to each other.

Shift Left Security DevSecOps

Shift Left Security: Catching Vulnerabilities Earlier

The later a vulnerability is found in the SDLC, the more it costs to fix. Shift left security moves detection to design, coding, and CI/CD — before vulnerabilities reach production.

GitHub Actions Hardening CI/CD Security

GitHub Actions Security Hardening: A Practical Guide

GitHub Actions runs with access to your secrets, code, and cloud environments. Learn how to lock down permissions, pin actions to SHAs, use OIDC tokens, and prevent workflow injection attacks.

Supply Chain CI/CD Security SLSA

Supply Chain Security in CI/CD: Protecting the Build Pipeline

Attackers target your CI/CD pipeline, not just your code. Learn how dependency confusion, malicious actions, build poisoning, and artifact tampering work — and how to defend against each.

GitLab Security Scanning SAST

Security Scanning in GitLab CI/CD: A Practical Guide

GitLab includes SAST, DAST, SCA, secret detection, and container scanning built in. Learn how to configure each scanner, understand their real limitations, and fill the gaps.

DevSecOps Metrics KPIs

DevSecOps Metrics and KPIs: Measuring Your Security Programme

You can't improve what you don't measure. Learn the DevSecOps metrics that matter — MTTR, vulnerability escape rate, security debt, false positive rate, and developer adoption.

No articles found Try a different search term or clear the search.
No noise, no spam

Get technical AppSec articles
in your inbox.

We publish one deep-dive per month on application security, IaC scanning, DevSecOps tooling, and vulnerability research. Engineers only.