Strategies Leveraging AI in Devsecops for Cloud Environments
This paper aims to review how AI can be implemented in DevSecOps for cloud environments for the improvement of security across the SDLC. Authenticated automation, predictive analytics, and detecting threats are significant in realizing the cloud-native applications’ complexity and speed.
openaire +1 more source
Cybersecurity considerations for radiology departments involved with artificial intelligence. [PDF]
Kelly BS +5 more
europepmc +1 more source
Smart contracts are central to decentralized applications but are often vulnerable to security flaws, both during development and in deployment. Due to their immutable nature, any vulnerabilities introduced are permanent and exploitable, highlighting the
Nghia Dinh +6 more
doaj +1 more source
The Importance of DevSecOps [PDF]
With the rapid growth of technology, the potential for data to be stolen has grown exponentially. Therefore, security needs to become a higher priority in applications. DevSecOps is a concept which seeks to do just that. With this presentation, I seek to
Gomes, Katia T.
core +1 more source
Cybersecurity for Cloud-Based Systems and Applications [PDF]
The rapid proliferation of cloud computing has transformed the way organizations manage and deploy their systems and applications. This paradigm shift, while offering numerous benefits such as scalability, cost efficiency, and accessibility, has also ...
Karrela, Sathyavrath
core +1 more source
Static-Analysis-Based Solutions to Security Challenges in Cloud-Native Systems: Systematic Mapping Study. [PDF]
Rahaman MS, Islam A, Cerny T, Hutton S.
europepmc +1 more source
Teaching Case: Security and Privacy Implications of Virtual Reality Applications in the Metaverse: A Case of Development, Security, and Operations (DevSecOps) [PDF]
The availability of powerful head-mounted displays (HMDs) has made virtual reality (VR) a mainstream technology and spearheaded the idea of immersive virtual experiences within the Metaverse – a shared and persistent virtual world.
Dincelli, Ersin, Yayla, Alper
core +2 more sources
The State of Practice for Security Unit Testing: Towards Data Driven Strategies to Shift Security into Developer\u27s Automated Testing Workflows [PDF]
The pressing need to “shift security left” in the software development lifecycle has motivated efforts to adapt the iterative and continuous process models used in practice today.
Gonzalez, Danielle Nicole
core +1 more source
Security Hardening and Compliance Assessment of Kubernetes Control Plane and Workloads
Containerized applications are pivotal to contemporary cloud-native architectures, yet they present novel security challenges. Kubernetes, a prevalent open-source platform for container orchestration, provides robust automation but lacks inherent ...
Zlatan Morić +2 more
doaj +1 more source
The development of modern web applications presents major challenges due to increasingly complex architectures, scalability requirements, and the need to reduce time to market.
Samira Khalfaoui +2 more
doaj +1 more source

