Blogs
The Practical DevSecOps blog where we share the best DevSecOps resources and free courses for DevSecOps enthusiasts like you.

Boost Your CI/CD Pipeline Security with These 7 Proven Steps
In the world of information technology, CI/CD pipelines play a vital role in releasing software updates by speeding up the overall process of software delivery. But with that speed arises risks, and pipeline security is a top precedence worldwide. That's where...
Boost Your CI/CD Pipeline Security with These 7 Proven Steps
In the world of information technology, CI/CD pipelines play a vital role in releasing software updates by speeding up the overall process of software delivery. But with that speed arises risks, and pipeline security is a top precedence worldwide. That's where...
What is STRIDE Threat Model?
Loren Kohnfelder and Praerit Garg, two engineers from...
What Is Threat Modeling Process?
Threat modeling is a systematic approach to analyzing the...
5 Best DevSecOps Virtual Conferences and Meetups this year
We live in unprecedented times and COVID-19 is going to...
Lesson 6: Defending container Infrastructure
PRACTICAL DEVSECOPS SECURING DOCKER CONTAINERS
Lesson 5: Hacking Containers Like A Boss – Part 2
PRACTICAL DEVSECOPS HACKING DOCKER CONTAINER LIKE A BOSS 2
Lesson 4: Hacking Containers Like A Boss
PRACTICAL DEVSECOPS HACKING DOCKER CONTAINER LIKE A BOSS
Lesson #3: Container reconnaissance techniques for beginners
PRACTICAL DEVSECOPS DOCKER CONTAINER…
Lesson 2: Docker Images, Docker Layers, and Registry
PRACTICAL DEVSECOP’S DOCKER IMAGE DEEP DIVE
Lesson 1: Understand Docker from a security perspective
Lesson one of Practical DevSecOps’s Free Docker Security Course.
Follow Along
Want more interesting content on DevSecOps ? Join our mailing list, we will be sure to send you weekly updates on DevSecOps.