Tags
devsecops
devsecops - london gathering
security
appsec
devops
sast
security testing
security assurance
kubernetes
iast
dast
istio
control plane
automation
devsecops pipeline
culture
containers
owasp
webgoat
sdlc
penetration testing
agile
michael man
application security
cyber security
static code analysis
certification
exams
k8s
microservices
cloud
policyascode
openpolicyagent
opa
ethics
programming
quality
codes
top ten
top10
bruce mayhew
l0pht
weldpond
chris wysopal
supply chain
opensource
veracode
tooling example
process
roles
engineers
pen testing
tooling
dso
anniversary
manchester
threat modeling
threat modelling
chris rutter
slideshare
past talks
rowan baker
packet
matt turner
andrew martin
k8
tutamantic
model
threatmodelling
static analysis
code quality
pipeline
dast iast
technology
people
terraform
aws
bastion
benjy portnoy
container
aquasec
web security
cmdb
patching
vulnerability management
vault
secrets
mman888
shift left
code analysis
security code analysis
mman
See more
Presentations
(22)Documents
(1)Likes
(1)10 predictions for cloud native in 2021
Cheryl Hung
•
3 years ago
Tags
devsecops
devsecops - london gathering
security
appsec
devops
sast
security testing
security assurance
kubernetes
iast
dast
istio
control plane
automation
devsecops pipeline
culture
containers
owasp
webgoat
sdlc
penetration testing
agile
michael man
application security
cyber security
static code analysis
certification
exams
k8s
microservices
cloud
policyascode
openpolicyagent
opa
ethics
programming
quality
codes
top ten
top10
bruce mayhew
l0pht
weldpond
chris wysopal
supply chain
opensource
veracode
tooling example
process
roles
engineers
pen testing
tooling
dso
anniversary
manchester
threat modeling
threat modelling
chris rutter
slideshare
past talks
rowan baker
packet
matt turner
andrew martin
k8
tutamantic
model
threatmodelling
static analysis
code quality
pipeline
dast iast
technology
people
terraform
aws
bastion
benjy portnoy
container
aquasec
web security
cmdb
patching
vulnerability management
vault
secrets
mman888
shift left
code analysis
security code analysis
mman
See more