DevSecOps is a software development paradigm that places a high emphasis on the culture of collaboration between developers (Dev), security (Sec) and operations (Ops) teams to deliver secure software continuously and rapidly. Adopting this paradigm effectively, therefore, requires an understanding of the challenges, best practices and available solutions for collaboration among these functional teams. However, collaborative aspects related to these teams have received very little empirical attention in the DevSecOps literature. Hence, we present a study focusing on a key security activity, Application Security Testing (AST), in which practitioners face difficulties performing collaborative work in a DevSecOps environment. Our study made nov...
Software development processes have been associated with severe conflicts between the development an...
DevSecOps is the extension of DevOps with security aspects and tools throughout all the stages of th...
With the rapid growth of technology, the potential for data to be stolen has grown exponentially. Th...
Context: DevOps (Development and Operations) has become one of the fastest-growing software developm...
DevOps (Development & Operation) is a set of practices that combine software development (Dev) and I...
Many software services are currently created using DevOps, where developers and operations personnel...
Security certification is a critical factor for deploying IT systems in the federal government. It i...
The main purpose of this paper is to explore the best practices that can be adopted to ensure securi...
The main purpose of this paper is to explore the best practices that can be adopted to ensure securi...
The main purpose of this paper is to explore the best practices that can be adopted to ensure securi...
peer-reviewedSecurity of software systems is of general concern, yet breaches caused by common vuln...
Development teams are increasingly expected to deliver secure code, but how can they best achieve th...
Many software vendors conduct or commission penetration testing of their products. In a penetration ...
For several years a trend in agile software development methodologies that connect the development w...
Implementing software security practices is a critical concern in modern software development. Indus...
Software development processes have been associated with severe conflicts between the development an...
DevSecOps is the extension of DevOps with security aspects and tools throughout all the stages of th...
With the rapid growth of technology, the potential for data to be stolen has grown exponentially. Th...
Context: DevOps (Development and Operations) has become one of the fastest-growing software developm...
DevOps (Development & Operation) is a set of practices that combine software development (Dev) and I...
Many software services are currently created using DevOps, where developers and operations personnel...
Security certification is a critical factor for deploying IT systems in the federal government. It i...
The main purpose of this paper is to explore the best practices that can be adopted to ensure securi...
The main purpose of this paper is to explore the best practices that can be adopted to ensure securi...
The main purpose of this paper is to explore the best practices that can be adopted to ensure securi...
peer-reviewedSecurity of software systems is of general concern, yet breaches caused by common vuln...
Development teams are increasingly expected to deliver secure code, but how can they best achieve th...
Many software vendors conduct or commission penetration testing of their products. In a penetration ...
For several years a trend in agile software development methodologies that connect the development w...
Implementing software security practices is a critical concern in modern software development. Indus...
Software development processes have been associated with severe conflicts between the development an...
DevSecOps is the extension of DevOps with security aspects and tools throughout all the stages of th...
With the rapid growth of technology, the potential for data to be stolen has grown exponentially. Th...