• Watch
  • Listen
  • Live Stream
Security Weekly
Security Market Validation
  • Listeners
    • Subscribe
    • Insider List
    • Suggest a Guest
  • Shows
    • Paul’s Security Weekly
    • Enterprise Security Weekly
    • Business Security Weekly
    • Application Security Weekly
    • Security & Compliance Weekly
    • Security Weekly News
    • Tradecraft Security Weekly
    • Secure Digital Life
  • Series
    • CISO Stories
    • Getting the Real Work Done in Cybersecurity
  • Webcasts/Trainings
    • Registration
    • On-demand
  • Articles
  • Partners
    • Become a Partner
    • Landing Pages
  • Hosts
  • Company
    • About
    • Careers
    • Contact

DevSecOps Scanning Challenges & Tips

Bill Brenner DAST, DevSecOps, probely October 26, 2021

There are many ways to do DevSecOps, and each organization — each security team, even — uses a different approach. Questions such as how many environments you have and the frequency of deployment of those environments are important in understanding how to integrate a security scanner into your DevSecOps machinery.

The ultimate goal is speed — how fast you can scan a new deployment. There are, of course, many barriers that will slow things down, including these:

  • Some scans run in blocking mode, which takes more time.
  • Running scans from dev environments tends to be slower because systems are lower-performance and may not be able to support faster scans.

Probely is among the security companies looking to help security teams move the needle via its web application and API vulnerability scanners, which scans and exposes vulnerabilities and provides a report of the findings with detailed instructions on how to fix them.

Probely CEO Nuno Loureiro and CTO Tiago Mendo joined AppSec Security Weekly to discuss the challenges of integrating a Dynamic Application Security Testing (DAST) scanner in DevSecOps and how to make the experience easier and more efficient.

Among the tips they offered:

  • Doing tailored scans for specific needs, which can run more quickly
  • Using tools that can identify tech stacks in use and narrow scans to just these
  • Conducting partial and incremental scans that will keep the process moving and avoid bottlenecks
  • Scoping down to specific endpoints and routes

This segment is sponsored by Probely. Visit https://securityweekly.com/probely to learn more about them and click here for the full episode!

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related Posts

Picture1

DevSecOps /

The Power of Developer-First Security

‹ It Should Be ‘Cybersecurity Culture Month’ › Decrypt As If Your Security Depends on It

About Security Weekly

Security Weekly is the security podcast network for the security community, distributing free podcasts and media since 2005. We connect the security industry and the security community through our security market validation programs.

More Than Just A Sponsor

We view our relationships with the security industry as partnerships, not sponsorships. Security Weekly works closely with each partner to help you achieve your marketing goals and gain traction in the security market. Interested in becoming a partner? Please visit our partnerships page.

Back to Top

Subscribe To The Blog:

RSS feed RSS - Posts

Search

Latest Tweets

Tweets by @secweekly
© Security Weekly 2022
Powered by WordPress • Themify WordPress Themes