09-23-20 - 30 Techniques to Align Security with What DevOps Already Loves

30 Techniques to Align Security with What DevOps Already Loves

CISO Series

30 Techniques to Align Security with What DevOps Already Loves

30 Techniques to Align Security with What DevOps Already Loves

For years the security industry has been selling DevOps security solutions that involve shifting left (placing security at the beginning of the process) or flat out inserting security into the process (better known as "DevSecOps"). Both come off as intrusions to a really successful party that developers and IT have started that the business adores.

Problem is DevOps still needs security, so I asked 33 cybersecurity professionals, "How does security align with the structure that DevOps already loves?"

Here's their advice.

Special thanks to this article sponsor, Capsule8.

Capsule8

is defining modern enterprise protection by providing detection and response for Linux infrastructure in any environment. Capsule8 provides host-based detection and investigatory data for incident response with on-going support. Unlike anyone else, Capsule8 mitigates the financial, scalability and reliability limitations of protecting your Linux infrastructure.

Subscribe to all our podcasts

Click any of the podcasts below to get access to the subscription feeds. If you're already a subscriber, thank you!