- CISO Series Newsletter
- Posts
- 09-23-20 - 30 Techniques to Align Security with What DevOps Already Loves
09-23-20 - 30 Techniques to Align Security with What DevOps Already Loves
30 Techniques to Align Security with What DevOps Already Loves
30 Techniques to Align Security with What DevOps Already Loves
For years the security industry has been selling DevOps security solutions that involve shifting left (placing security at the beginning of the process) or flat out inserting security into the process (better known as "DevSecOps"). Both come off as intrusions to a really successful party that developers and IT have started that the business adores.
Problem is DevOps still needs security, so I asked 33 cybersecurity professionals, "How does security align with the structure that DevOps already loves?"
Here's their advice.
Special thanks to this article sponsor, Capsule8.
is defining modern enterprise protection by providing detection and response for Linux infrastructure in any environment. Capsule8 provides host-based detection and investigatory data for incident response with on-going support. Unlike anyone else, Capsule8 mitigates the financial, scalability and reliability limitations of protecting your Linux infrastructure.
Subscribe to all our podcasts
Click any of the podcasts below to get access to the subscription feeds. If you're already a subscriber, thank you!