[HTML][HTML] Identifying the primary dimensions of DevSecOps: A multi-vocal literature review
Context: Security as a key non-functional requirement of software development is often
ignored and devalued in DevOps programs, with security seen as an inhibitor to high …
ignored and devalued in DevOps programs, with security seen as an inhibitor to high …
Threat-based simulation of data exfiltration toward mitigating multiple ransomware extortions
M Mundt, H Baier - Digital Threats: Research and Practice, 2023 - dl.acm.org
Network-based attacks and their mitigation are of increasing importance in our ever-
connected world. Often network-based attacks address valuable data, which the attacker …
connected world. Often network-based attacks address valuable data, which the attacker …
A transformer-based IDE plugin for vulnerability detection
Automatic vulnerability detection is of paramount importance to promote the security of an
application and should be exercised at the earliest stages within the software development …
application and should be exercised at the earliest stages within the software development …
Better Left Shift Security! Framework for Secure Software Development
A Dawoud, S Finster, N Coppik… - 2024 IEEE European …, 2024 - ieeexplore.ieee.org
The concept of security left-shifting focuses on integrating security processes, traditionally
occurring later in the Software Development Life Cycle, into the early development phase …
occurring later in the Software Development Life Cycle, into the early development phase …
Secure Cloud Migration Strategy (SCMS): A Safe Journey to the Cloud
D Alharthi - International Conference on Cyber Warfare and …, 2023 - books.google.com
The state of cloud security is evolving. Many organizations are migrating their on-premises
data centers to cloud networks at a rapid pace due to the benefits like cost-effectiveness …
data centers to cloud networks at a rapid pace due to the benefits like cost-effectiveness …
Securing Container Images through Automated Vulnerability Detection in Shift-Left CI/CD Pipelines
AK Bhardwaj, PK Dutta… - Babylonian Journal of …, 2024 - mesopotamian.press
Integrating shift-left security practices and automated vulnerability detection in container
images is imperative for modern software development, given the dynamics and …
images is imperative for modern software development, given the dynamics and …
A Match Made in Heaven? Matching Test Cases and Vulnerabilities With the VUTECO Approach
Software vulnerabilities are commonly detected via static analysis, penetration testing, and
fuzzing. They can also be found by running unit tests-so-called vulnerability-witnessing tests …
fuzzing. They can also be found by running unit tests-so-called vulnerability-witnessing tests …
[PDF][PDF] VULNERABILITY MANAGEMENT IN THE AGE OF CONTAINERS–A REVIEW
G Jaisinghani - International Journal of Information Security (IJIS), 2022 - researchgate.net
While the concept of containerization has existed for a few decades, the use application
containers skyrocketed with the introduction of Docker. Containers facilitate a microservice …
containers skyrocketed with the introduction of Docker. Containers facilitate a microservice …
Cybersecurity Awareness Training for Industrial Software Developers via a Serious Game for Code Review
AC Iosif, U Lechner, M Pinto-Albuquerque… - 2024 - aisel.aisnet.org
Software developers must not only be capable of producing secure code, but must also
possess the ability to identify security vulnerabilities when evaluating their peers' work. The …
possess the ability to identify security vulnerabilities when evaluating their peers' work. The …
APPLICATION SECURITY AND LEAST PRIVILEGE ACCESS IN MODERN DEVOPS
A Chava - The American Journal of Engineering and Technology, 2024 - inlibrary.uz
In the context of modern DevOps, application security and the implementation of the
principle of least privilege (PoLP) are becoming critical elements aimed at minimizing risks …
principle of least privilege (PoLP) are becoming critical elements aimed at minimizing risks …