[HTML][HTML] Identifying the primary dimensions of DevSecOps: A multi-vocal literature review

X Zhao, T Clear, R Lal - Journal of Systems and Software, 2024 - Elsevier
Context: Security as a key non-functional requirement of software development is often
ignored and devalued in DevOps programs, with security seen as an inhibitor to high …

Threat-based simulation of data exfiltration toward mitigating multiple ransomware extortions

M Mundt, H Baier - Digital Threats: Research and Practice, 2023 - dl.acm.org
Network-based attacks and their mitigation are of increasing importance in our ever-
connected world. Often network-based attacks address valuable data, which the attacker …

A transformer-based IDE plugin for vulnerability detection

C Mamede, E Pinconschi, R Abreu - Proceedings of the 37th IEEE/ACM …, 2022 - dl.acm.org
Automatic vulnerability detection is of paramount importance to promote the security of an
application and should be exercised at the earliest stages within the software development …

Better Left Shift Security! Framework for Secure Software Development

A Dawoud, S Finster, N Coppik… - 2024 IEEE European …, 2024 - ieeexplore.ieee.org
The concept of security left-shifting focuses on integrating security processes, traditionally
occurring later in the Software Development Life Cycle, into the early development phase …

Secure Cloud Migration Strategy (SCMS): A Safe Journey to the Cloud

D Alharthi - International Conference on Cyber Warfare and …, 2023 - books.google.com
The state of cloud security is evolving. Many organizations are migrating their on-premises
data centers to cloud networks at a rapid pace due to the benefits like cost-effectiveness …

Securing Container Images through Automated Vulnerability Detection in Shift-Left CI/CD Pipelines

AK Bhardwaj, PK Dutta… - Babylonian Journal of …, 2024 - mesopotamian.press
Integrating shift-left security practices and automated vulnerability detection in container
images is imperative for modern software development, given the dynamics and …

A Match Made in Heaven? Matching Test Cases and Vulnerabilities With the VUTECO Approach

E Iannone, QC Bui, R Scandariato - arxiv preprint arxiv:2502.03365, 2025 - arxiv.org
Software vulnerabilities are commonly detected via static analysis, penetration testing, and
fuzzing. They can also be found by running unit tests-so-called vulnerability-witnessing tests …

[PDF][PDF] VULNERABILITY MANAGEMENT IN THE AGE OF CONTAINERS–A REVIEW

G Jaisinghani - International Journal of Information Security (IJIS), 2022 - researchgate.net
While the concept of containerization has existed for a few decades, the use application
containers skyrocketed with the introduction of Docker. Containers facilitate a microservice …

Cybersecurity Awareness Training for Industrial Software Developers via a Serious Game for Code Review

AC Iosif, U Lechner, M Pinto-Albuquerque… - 2024 - aisel.aisnet.org
Software developers must not only be capable of producing secure code, but must also
possess the ability to identify security vulnerabilities when evaluating their peers' work. The …

APPLICATION SECURITY AND LEAST PRIVILEGE ACCESS IN MODERN DEVOPS

A Chava - The American Journal of Engineering and Technology, 2024 - inlibrary.uz
In the context of modern DevOps, application security and the implementation of the
principle of least privilege (PoLP) are becoming critical elements aimed at minimizing risks …