« Blog Home

Archive for the ‘DevSecOps’ Category

Watch our Webinar: Docker Overview and What’s New

Invitation to a Webinar: An Overview of Docker and What's New

You are invited to our webinar on Docker, where we will present the latest updates to the product.Docker’s solution today offers advanced container management and image protection, and includes several key components: 🎥 On October 21 we delivered a live webinar on Docker which included: 👉🏻 Watch here here (leave your details and then the recording will […]

Read more »

We Represent and Support Docker

docker logo

We have been chosen to officially represent the solutions of Docker ,
and we now offer licensing, support, integration with complementary tools, managed services and more.

Read more »

How Docker Integrates with Git and GitLab: A DevOps Overview

docker gitlab integration

Overview of how Docker connects with git and GitLab, offering best practices for workflows optimized for today’s DevOps environments

Read more »

New: Docker Introduces Hardened Images – Secure, Minimal, and Ready for Production

docker hardened images

Docker recently introduced a new service – Docker Hardened Images (DHI). These are container images that are secure by default, built specifically for modern production environments.

Read more »

How Docker Empowers Software Developers and Engineers?

docker logo

Docker is highly valuable for software developers and engineers, making common tasks more efficient and reliable in daily workflows.
In this article we summarize the main benefits of using Docker by software engineers.

Read more »

How HashiCorp Vault Helps Prevent Security Breaches by Protecting Secrets?

hashicorp vault illustration

Executive summary: Most breaches involving “secrets” are not zero‑days – they’re the result of static passwords left in configs, long‑lived cloud keys scattered across systems, or environment variables that get copied into logs and crash dumps. HashiCorp Vault changes that story by replacing secrets‑at‑rest with just‑in‑time delivery and dynamic credentials that expire quickly and can […]

Read more »

The NPM Supply Chain Attack of September 8, 2025

Npm logo

On September 8, 2025, a massive npm supply chain attack compromised 18 foundational JavaScript packages, putting billions of applications at risk. This sophisticated incident began with a phishing campaign targeting a prominent package maintainer, Josh Junon, who was lured into providing his login and two-factor authentication (2FA) credentials on a fake npm website. Attackers then used this access to publish malicious updates containing […]

Read more »

Mattermost Incident Response: Secure, Out-of-Band Communication for Cybersecurity and Business Continuity

mattermost desktop incident response

Read how Mattermost incident response solutions help teams manage cybersecurity incidents

Read more »

VOD Library of Dev DevOps DevSecOps Webinars (2025)

devops webinars video on demand

We’ve recently organized the videos we have recorded over the years into a centralized “library” of VOD (Video On-Demand)

Read more »

Watch Webinar: OSS Vulnerabilities and Malware Prevention using Socket

sca socket almtoolbox webinar

We hosted Socket.dev company to discuss different aspects of OSS Vulnerabilities and Malware Prevention

Read more »

Watch Webinar: Secrets Management with Infisical + Demo

infisicial webinar

We hosted Infisical company to discuss different aspects of secrets management

Read more »

New: VOD Library of DevOps Webinars

devops webinars video on demand

We’ve recently organized the videos we have recorded over the years into a centralized “library” of VOD (Video On-Demand) .We arranged it by products, tags, language and recording date (at your convivence). Feel free to find what interests you the most and watch! >> The DevOps VOD library is available here Do you want to […]

Read more »

Code Security and Compliance using GitLab

gitlab devsecops appsec alm-toolbox

Besides version control and CI/CD, GitLab also offers a variety of security tests on your proprietary code (code you develop) or external code you use (i.e. open source), as well as code compliance capabilities – to help you ensure that you make proper and legal use of any open source libraries and code snippets. In […]

Read more »

About the connection between GitLab and OpenShift

openshift-gitlab-kubernetes

As a company that deals a lot with GitLab and Kubernetes and helps many customers with these issues, We are often asked about the nature of the connection between GitLab and GitLab CI/CD and Kubernetes, and in particular OpenShift. From ongoing engagement on the subject, we have accumulated quite a bit of knowledge and decided […]

Read more »

What are Differences of SonarQube Editions?

sonarqube editions

Initially written in January 2022. Last update: April 2023 I’m frequently asked what the differences are between SonarQube versions. From the questions it is clear that the licensing options are not so clear and quite confusing, so I decided to write down the essential points and help make things right. Legend: Core differences What’s in […]

Read more »

    * Full Name

    * Work Email

    * Are you using any AI tools today? What tools?

      * Full Name

      * Work Email

      Are you using any SCA solution? Which one?

        * Full Name

        * Work Email

        * Are you using OpenProject?

        Do you have any questions you'd like to ask before the webinar?

          * Full Name

          * Work Email

          * Are you using any Secrets Management solution? Which one?