DEV Community

# devsecops

Integrating security practices into the DevOps lifecycle.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
The TanStack Attack: How a Worm Slipped Through the npm Pipeline

The TanStack Attack: How a Worm Slipped Through the npm Pipeline

Comments
6 min read
What LucidShark Would Have Caught Before the TanStack Attack Landed

What LucidShark Would Have Caught Before the TanStack Attack Landed

Comments
7 min read
Every CISO Needs an AIBOM in 2026 — Here's What Vendors Get Wrong

Every CISO Needs an AIBOM in 2026 — Here's What Vendors Get Wrong

Comments
8 min read
How to Review Code Your AI Agent Wrote While You Were Sleeping

How to Review Code Your AI Agent Wrote While You Were Sleeping

Comments
7 min read
Why Every CISO Needs an AIBOM in 2026 — And What Vendors Miss

Why Every CISO Needs an AIBOM in 2026 — And What Vendors Miss

Comments
9 min read
Four Pillars, One Platform: How Cybrium Unifies Code, Cloud, AI, and GRC

Four Pillars, One Platform: How Cybrium Unifies Code, Cloud, AI, and GRC

Comments
10 min read
Why I Stopped Letting Claude Shell Out for Security Scans

Why I Stopped Letting Claude Shell Out for Security Scans

Comments 1
10 min read
Zero Trust Is Not a Product — It Is a Discipline You Build

Zero Trust Is Not a Product — It Is a Discipline You Build

Comments
1 min read
CLAUDE.md Is a Security Boundary

CLAUDE.md Is a Security Boundary

1
Comments
7 min read
How I Built, Scanned, and Automated a Docker Pipeline

How I Built, Scanned, and Automated a Docker Pipeline

Comments
10 min read
Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

Comments
28 min read
Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

Comments
28 min read
Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

Twelve Trust Boundaries: A Field Guide to Supply-Chain Defense After axios@1.14.1

1
Comments
29 min read
Approve Once, Exploit Forever: The Trust Persistence Vulnerability Vendors Will Not Fix

Approve Once, Exploit Forever: The Trust Persistence Vulnerability Vendors Will Not Fix

1
Comments
6 min read
Short-Lived Credentials in Agentic Systems: A Practical Trade-off Guide

Short-Lived Credentials in Agentic Systems: A Practical Trade-off Guide

1
Comments 1
11 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.