Tagged articles
7 articles
Page 1 of 1
Software Development Quality
Software Development Quality
May 16, 2023 · Information Security

Mastering DevSecOps: Essential Security Testing Strategies for Modern Applications

As DevOps accelerates software delivery, integrating robust security testing—through static, dynamic, interactive application security testing and software composition analysis—becomes essential, and this article explains the importance, methods, tools, and best practices, including Huawei Cloud’s approach, to ensure comprehensive protection across the development lifecycle.

DASTDevSecOpsIAST
0 likes · 15 min read
Mastering DevSecOps: Essential Security Testing Strategies for Modern Applications
DevOps
DevOps
Aug 26, 2022 · Information Security

Security Testing Practices in DevSecOps and Huawei Cloud

The article explains the importance of security testing within DevSecOps, outlines key testing methods such as SAST, DAST, IAST, and SCA, discusses penetration testing, and describes Huawei Cloud's comprehensive security testing framework and practices for ensuring software safety in modern development pipelines.

DASTDevSecOpsIAST
0 likes · 13 min read
Security Testing Practices in DevSecOps and Huawei Cloud
SQB Blog
SQB Blog
Aug 24, 2022 · Operations

Accelerating Delivery: Our CI/CD, Branch Automation & Artifact Management Revamp

This article outlines how our team overhauled the CI/CD pipeline, migrated from Jenkins to GitLab CI, introduced Kubernetes‑based execution, automated branch management via Jira integration, restructured artifact storage with JFrog, and built an in‑house SCA solution, all to boost development efficiency, reduce manual errors, and secure software delivery.

Artifact ManagementAutomationDevOps
0 likes · 17 min read
Accelerating Delivery: Our CI/CD, Branch Automation & Artifact Management Revamp
DeWu Technology
DeWu Technology
Jul 15, 2022 · Information Security

Software Composition Analysis (SCA): Overview, Challenges, and Implementation

Software Composition Analysis (SCA) identifies and tracks open‑source components across languages, matches them to vulnerability databases, and integrates risk detection into CI pipelines, helping organizations mitigate widespread flaws like Log4j2 while addressing challenges of diverse package formats, binary analysis, and accurate vulnerability correlation.

Dependency AnalysisSCASoftware Security
0 likes · 8 min read
Software Composition Analysis (SCA): Overview, Challenges, and Implementation
Ctrip Technology
Ctrip Technology
Jul 9, 2020 · Information Security

Ctrip's DevSecOps Practices and Challenges

The article details Ctrip's DevSecOps challenges and solutions, covering security team structuring, threat modeling, SCA and SAST integration, IAST/DAST architecture, vulnerability management, and the resulting improvements in automated security testing within a high‑frequency CI/CD environment.

DevSecOpsIASTSAST
0 likes · 12 min read
Ctrip's DevSecOps Practices and Challenges