{"id":7813,"date":"2022-02-23T08:10:27","date_gmt":"2022-02-23T06:10:27","guid":{"rendered":"https:\/\/www.almtoolbox.com\/blog_he\/?p=7813"},"modified":"2023-03-17T16:34:51","modified_gmt":"2023-03-17T14:34:51","slug":"code-security-trends-recording","status":"publish","type":"post","link":"https:\/\/www.almtoolbox.com\/blog_he\/code-security-trends-recording\/","title":{"rendered":"\u05d4\u05e7\u05dc\u05d8\u05d4 \u05d7\u05d3\u05e9\u05d4: \u05d8\u05e8\u05e0\u05d3\u05d9\u05dd \u05d1- Code &#038; Application Security"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-7818\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2022\/02\/idftech3d.jpg\" alt=\"IDF TECH\" width=\"564\" height=\"188\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2022\/02\/idftech3d.jpg 564w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2022\/02\/idftech3d-300x100.jpg 300w\" sizes=\"auto, (max-width: 564px) 100vw, 564px\" \/><\/p>\n<p>\u05d1\u05d9\u05d5\u05dd \u05d3 9\/2\/22 \u05d4\u05d9\u05d4 \u05db\u05e0\u05e1 \u05de\u05e8\u05e9\u05d9\u05dd \u05e9\u05d0\u05d5\u05e8\u05d2\u05df \u05e2&quot;\u05d9 \u05e2\u05de\u05d5\u05ea\u05ea \u05d1\u05d5\u05d2\u05e8\u05d9 \u05de\u05de\u05e8&quot;\u05dd, \u05d4\u05d5\u05e2\u05d1\u05e8 \u05e2&quot;\u05d9 \u05d1\u05d5\u05d2\u05e8\u05d9 \u05de\u05de\u05e8&quot;\u05dd \u05d5\u05d4\u05d9\u05d4 \u05de\u05d9\u05d5\u05e2\u05d3 \u05de\u05dc\u05db\u05ea\u05d7\u05d9\u05dc\u05d4 \u05dc\u05e6\u05d1\u05d0 \u05d5\u05dc\u05d7\u05d9\u05d9\u05dc\u05d9\u05dd, \u05d0\u05da \u05d1\u05e4\u05d5\u05e2\u05dc \u05d4\u05d9\u05d4 \u05e4\u05ea\u05d5\u05d7 \u05d1\u05d0\u05d5\u05e4\u05df \u05d7\u05d5\u05e4\u05e9\u05d9 \u05dc\u05db\u05dc \u05de\u05d9 \u05e9\u05e8\u05e6\u05d4 \u05dc\u05d4\u05d0\u05d6\u05d9\u05df.<\/p>\n<p>\u05d0\u05e0\u05d9 \u05d4\u05d5\u05d6\u05de\u05e0\u05ea\u05d9 \u05dc\u05d4\u05e2\u05d1\u05d9\u05e8 \u05e9\u05d9\u05d7\u05d4 \u05e7\u05e6\u05e8\u05d4 \u05e2\u05dc \u05de\u05d2\u05de\u05d5\u05ea \u05e9\u05d0\u05e0\u05d9 \u05e8\u05d5\u05d0\u05d4 \u05d1\u05d4\u05d2\u05e0\u05d4 \u05e2\u05dc \u05e7\u05d5\u05d3 \u05d5\u05d0\u05e4\u05dc\u05d9\u05e7\u05e6\u05d9\u05d5\u05ea \u05d5\u05e2\u05dc <em>\u05e4\u05d9\u05ea\u05d5\u05d7 \u05e7\u05d5\u05d3 \u05de\u05d0\u05d5\u05d1\u05d8\u05d7<\/em>, \u05db\u05e4\u05d9 \u05e9\u05d0\u05e0\u05d9 \u05e8\u05d5\u05d0\u05d4 \u05d6\u05d0\u05ea &quot;\u05d1\u05e9\u05d8\u05d7&quot; \u05de\u05e9\u05d9\u05d7\u05d5\u05ea \u05e2\u05dd \u05dc\u05e7\u05d5\u05d7\u05d5\u05ea \u05d5\u05d9\u05e6\u05e8\u05e0\u05d9 \u05db\u05dc\u05d9\u05dd \u05d1\u05ea\u05d7\u05d5\u05dd.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-7819\" src=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2022\/02\/trends-code-security-1st-slide.jpg\" alt=\"trends in code and application security\" width=\"672\" height=\"381\" srcset=\"https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2022\/02\/trends-code-security-1st-slide.jpg 1123w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2022\/02\/trends-code-security-1st-slide-300x170.jpg 300w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2022\/02\/trends-code-security-1st-slide-1024x580.jpg 1024w, https:\/\/www.almtoolbox.com\/blog_he\/wp-content\/uploads\/2022\/02\/trends-code-security-1st-slide-768x435.jpg 768w\" sizes=\"auto, (max-width: 672px) 100vw, 672px\" \/><\/p>\n<p>\u05db\u05e2\u05ea \u05d9\u05e9 \u05d4\u05e7\u05dc\u05d8\u05d4, \u05d5\u05d0\u05e0\u05d9 \u05de\u05e6\u05e8\u05e3 \u05d0\u05d5\u05ea\u05d4 \u05d5\u05d0\u05ea \u05d4\u05e9\u05e7\u05e4\u05d9\u05dd.<\/p>\n<h3>\u05e0\u05d5\u05e9\u05d0\u05d9\u05dd \u05e9\u05d4\u05d6\u05db\u05e8\u05ea\u05d9 \u05d1\u05de\u05d4\u05dc\u05da \u05e9\u05d9\u05d7\u05ea\u05d9 (\u05d1\u05e7\u05e6\u05e8\u05d4):<\/h3>\n<p style=\"direction: ltr;\">Shift Left, CI\/CD, SAST, DAST, OSS (open source), Secret management, Supply chain attacks, Runtime protection, Containers, Infrastructures as code (IaC), DevSecOps, OWASP Top 10, microservices, M2M, secure CI pipelines, GitOps, Drifting detection<\/p>\n<h3>\u05d4\u05d4\u05e7\u05dc\u05d8\u05d4 \u05db\u05d0\u05df (\u05d6\u05de\u05df \u05e6\u05e4\u05d9\u05d4: 22 \u05d3\u05e7\u05d5\u05ea) :<\/h3>\n<p><iframe loading=\"lazy\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/Jkaw5rOS_hM\" width=\"700\" height=\"393.75\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><\/iframe><\/p>\n<p><em>\u05d4\u05e2\u05e8\u05d4: \u05d4\u05d6\u05de\u05df \u05e9\u05e0\u05d9\u05ea\u05df \u05dc\u05d9 \u05dc\u05d3\u05d1\u05e8 \u05d4\u05d9\u05d4 \u05d1\u05e4\u05d5\u05e2\u05dc \u05e7\u05e6\u05e8 \u05d1 10 \u05d3\u05e7\u05d5\u05ea \u05de\u05d4\u05de\u05ea\u05d5\u05db\u05e0\u05df, \u05dc\u05db\u05df \u05d3\u05d9\u05d1\u05e8\u05ea\u05d9 \u05de\u05d4\u05e8 \u05de\u05d0\u05d5\u05d3 \u05d5\u05d1\u05ea\u05de\u05e6\u05d5\u05ea. \u05d9\u05ea\u05db\u05df \u05d5\u05d0\u05e7\u05dc\u05d9\u05d8 \u05d0\u05ea \u05d4\u05e9\u05d9\u05d7\u05d4 \u05de\u05d7\u05d3\u05e9 \u05d1\u05e2\u05ea\u05d9\u05d3<br \/>\n(\u05e0\u05d9\u05ea\u05df \u05dc\u05d4\u05e8\u05e9\u05dd \u05d1\u05e1\u05d5\u05e3 \u05d4\u05de\u05d0\u05de\u05e8 \u05dc\u05e7\u05d1\u05dc\u05ea \u05e2\u05d3\u05db\u05d5\u05e0\u05d9\u05dd \u05e2\u05ea\u05d9\u05d3\u05d9\u05d9\u05dd).<\/em><\/p>\n<h3>\u05e9\u05e7\u05e4\u05d9\u05dd:<\/h3>\n<p><iframe loading=\"lazy\" src=\"https:\/\/docs.google.com\/presentation\/d\/e\/2PACX-1vRWa338r-3WsQ4sPfdyIlPHSUQi3MFyUUTGjmLYXzxUVeHMd-nfey8LFCALnBFULw\/embed?start=false&amp;loop=false&amp;delayms=3000\" width=\"700\" height=\"422\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>\u05de\u05d9\u05d3\u05e2 \u05e0\u05d5\u05e1\u05e3 \u05d1<a href=\"https:\/\/www.almtoolbox.com\/blog_he\/devops-vod-library\/\" target=\"_blank\" rel=\"noopener\">\u05e1\u05e4\u05e8\u05d9\u05d9\u05ea \u05d4 VOD \u05e9\u05dc\u05e0\u05d5<\/a> \u05e9\u05de\u05db\u05d9\u05dc\u05d4 \u05d4\u05e8\u05d1\u05d4 \u05d4\u05e7\u05dc\u05d8\u05d5\u05ea \u05d5-\u05d5\u05d5\u05d1\u05d9\u05e0\u05e8\u05d9\u05dd \u05d1\u05e0\u05d5\u05e9\u05d0, \u05d5\u05db\u05df <a href=\"https:\/\/www.almtoolbox.com\/blog_he\/\" target=\"_blank\" rel=\"noopener\">\u05d1\u05d1\u05dc\u05d5\u05d2 \u05e9\u05dc\u05e0\u05d5 \u05d1\u05e2\u05d1\u05e8\u05d9\u05ea<\/a> (\u05e9\u05e0\u05d9\u05d4\u05dd \u05e0\u05d2\u05d9\u05e9\u05d9\u05dd \u05d1\u05d0\u05d5\u05e4\u05df \u05d7\u05d5\u05e4\u05e9\u05d9).<\/p>\n<div class=\"alm-box\">\u05d7\u05d1\u05e8\u05ea ALM-Toolbox \u05de\u05ea\u05de\u05d7\u05d4 \u05d1- ALM , \u05d1- DevSecOps \u05d5\u05d1\u05e2\u05d6\u05e8\u05d4 \u05d1\u05e4\u05d9\u05ea\u05d5\u05d7 \u05e7\u05d5\u05d3 \u05de\u05d0\u05d5\u05d1\u05d8\u05d7,<br \/>\n\u05d5\u05e2\u05d5\u05d6\u05e8\u05ea \u05dc\u05dc\u05e7\u05d5\u05d7\u05d5\u05ea\u05d9\u05d4 \u05dc\u05d1\u05d7\u05d5\u05e8 \u05d5\u05dc\u05d9\u05d9\u05e9\u05dd \u05d0\u05ea \u05d4\u05d8\u05db\u05e0\u05d5\u05dc\u05d5\u05d2\u05d9\u05d5\u05ea \u05d5\u05d4\u05db\u05dc\u05d9\u05dd \u05d4\u05de\u05ea\u05d0\u05d9\u05de\u05d9\u05dd \u05dc\u05d4\u05dd \u05d1\u05d9\u05d5\u05ea\u05e8 \u05d1\u05d4\u05ea\u05d0\u05dd \u05dc\u05d3\u05e8\u05d9\u05e9\u05d5\u05ea \u05d5\u05dc\u05e6\u05e8\u05db\u05d9\u05dd \u05e9\u05dc\u05d4\u05dd.<br \/>\n\u05d0\u05e0\u05d5 \u05de\u05e6\u05d9\u05e2\u05d9\u05dd \u05d9\u05e2\u05d5\u05e5, \u05d4\u05d3\u05e8\u05db\u05d5\u05ea, \u05ea\u05de\u05d9\u05db\u05d4, \u05de\u05db\u05d9\u05e8\u05ea \u05e8\u05d9\u05e9\u05d5\u05d9 \u05d5\u05e2\u05d5\u05d3. \u05dc\u05d9\u05e6\u05d9\u05e8\u05ea \u05e7\u05e9\u05e8: devsecops @ almtoolbox.com \u05d0\u05d5 \u05d8\u05dc\u05e4\u05d5\u05e0\u05d9\u05ea: 072-240-5222<\/div>\n<h3>\u05e7\u05d9\u05e9\u05d5\u05e8\u05d9\u05dd \u05e8\u05dc\u05d1\u05e0\u05d8\u05d9\u05dd:<\/h3>\n<ul>\n<li><a href=\"http:\/\/www.almtoolbox.com\/tools.html\" target=\"_blank\" rel=\"noopener\">\u05e8\u05e9\u05d9\u05de\u05ea \u05db\u05dc\u05d9\u05dd \u05e9\u05d0\u05e0\u05d5 \u05ea\u05d5\u05de\u05db\u05d9\u05dd \u05d5\u05de\u05e9\u05d5\u05d5\u05e7\u05d9\u05dd<\/a><\/li>\n<li><a href=\"https:\/\/www.idftech3d.com\/\" target=\"_blank\" rel=\"noopener\">\u05d0\u05ea\u05e8 \u05d4\u05db\u05e0\u05e1<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u05e9\u05d9\u05d7\u05d4 \u05e7\u05e6\u05e8\u05d4 \u05e2\u05dc \u05de\u05d2\u05de\u05d5\u05ea \u05d1\u05d4\u05d2\u05e0\u05d4 \u05e2\u05dc \u05e7\u05d5\u05d3 \u05d5\u05d0\u05e4\u05dc\u05d9\u05e7\u05e6\u05d9\u05d5\u05ea \u05d5\u05e2\u05dc \u05e4\u05d9\u05ea\u05d5\u05d7 \u05e7\u05d5\u05d3 \u05de\u05d0\u05d5\u05d1\u05d8\u05d7, \u05db\u05e4\u05d9 \u05e9\u05e8\u05d5\u05d0\u05d9\u05dd &quot;\u05d1\u05e9\u05d8\u05d7&quot; \u05de\u05e9\u05d9\u05d7\u05d5\u05ea \u05e2\u05dd \u05dc\u05e7\u05d5\u05d7\u05d5\u05ea \u05d5\u05d9\u05e6\u05e8\u05e0\u05d9 \u05db\u05dc\u05d9\u05dd \u05d1\u05ea\u05d7\u05d5\u05dd<\/p>\n","protected":false},"author":5,"featured_media":7819,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[745,60,189],"tags":[744,732],"class_list":["post-7813","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-appsec","category-devops","category-devsecops","tag-744","tag-732"],"_links":{"self":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/7813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/comments?post=7813"}],"version-history":[{"count":10,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/7813\/revisions"}],"predecessor-version":[{"id":8876,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/posts\/7813\/revisions\/8876"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media\/7819"}],"wp:attachment":[{"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/media?parent=7813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/categories?post=7813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.almtoolbox.com\/blog_he\/wp-json\/wp\/v2\/tags?post=7813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}