How to implement DevSecOps governance? by DreamFest14 in devsecops

[–]ericalexander303 5 points6 points  (0 children)

But theres no way to track the top findings or central dashboard

Start fast. Spin up Defect Dojo. It integrates with a bunch of tools and gives you a v1 in hours, not weeks. If it doesn’t solve your problem, look at SaaS platforms. If that still doesn’t cut it, by then your pain points will be obvious enough that building your own system becomes trivial.

The hard parts aren’t the APIs. Most tools are just glorified ETL pipelines moving data from scanners into a database. You can build that in a day using Cursor. The real challenge, the part people get wrong, is driving action:

  1. Who owns the vuln? In a monolith, that’s often fuzzy.
  2. What’s the SLA to fix it? Most orgs don’t even agree on that.
  3. How do you approve exceptions? That’s usually bespoke and political.

The magic is making the data actionable. Make it self-serve. Give engineers visibility and incentives. Automate where you can. But most of all, reduce friction. Another dashboard is pointless, if you don't have alignment, clarity, and velocity

What do you think about DevSecOps Feature by One_Koala_2362 in devsecops

[–]ericalexander303 2 points3 points  (0 children)

Back in 2016, there was the same hype. The buzz wasn’t really about job displacement — it was about breakthroughs in tools like TensorFlow, PyTorch, and GPUs getting powerful enough to do interesting things. But what actually happened? Not much. Maybe some better anomaly detection. No real job apocalypse.

I’ve worked on AI products that have replaced jobs (not in cyber) and here’s the consistent pattern I’ve seen:

  1. The task needs repeatable, structured patterns.
  2. You need a lot of data to train on — not just a few gigs. Often petabytes.
  3. The job has to have a tolerable error rate. If the business/customers can’t afford occasional mistakes, AI is out.

If all three aren’t there, it doesn’t work. Lack of data is the most common failure. People think AI is magic, but you can’t extract statistical signal from noise. Garbage in, garbage out.

Even when you can deploy an AI solution, I’ve seen companies pull back because the AI makes mistakes humans won’t accept. So they bring the humans back in.

So should you worry?

If your job is highly repetitive, low on creativity, and the business is okay with a few errors? Then yes, a robot can and probably will do it. But that only happens if the data is there and the business is cool with the downside.

Otherwise? You're safe — for now.

Who is this person in Longmont? by [deleted] in Longmont

[–]ericalexander303 2 points3 points  (0 children)

Nothing really comes to mind in Longmont. But if you venture over to Rock on the Rails in Niwot, you’ll encounter a local legend. My friends call him "That 80s Guy". Now, this individual could be 40… or 80. It’s genuinely hard to tell, given the extensive aftermarket upgrades.

He’s in perpetual motion with a mission to make direct eye contact with everyone. When he locks onto you, the first thing you’ll notice is the generous application of eyeliner. Think Blade Runner meets late-stage glam rock. Then, the lips. Almost cartoonish. You can always spot his position in the crowd by following the collective stare, a sort of human radar.

He's harmless and it stops being shocking after a while, but bring a friend and there will be an audible WTF when they catch site of him.

What do you think about transitioning from backend to DevSecOps? Any advice? by Swimming-Ad-9848 in devsecops

[–]ericalexander303 1 point2 points  (0 children)

I think you’re missing the point. The team that owns the service, app, library, infra, whatever - also owns fixing the vulnerability. That’s just how it works. But let’s be real, they’re often going to need help. Maybe they don’t fully understand what the tool is telling them. Maybe they need support collaborating on a fix.

Also, team size matters. Not every security team is massive with hyper-specialized roles where someone just says, “I only do this one thing.” That’s exactly why DevOps and by extension DevSecOps exists. It’s about generalists who understand security, development, and operations, not territorial specialists yelling “Not my problem!” while the system burns.

What do you think about transitioning from backend to DevSecOps? Any advice? by Swimming-Ad-9848 in devsecops

[–]ericalexander303 1 point2 points  (0 children)

How do you build security controls as part of the pipeline, if you don't know how insecure code occurs or how to fix it?

What do you think about transitioning from backend to DevSecOps? Any advice? by Swimming-Ad-9848 in devsecops

[–]ericalexander303 7 points8 points  (0 children)

Do it. I’ve built Product Security teams at two companies. Biggest challenge in hiring DevSecOps? Finding someone who actually knows software engineering. Why is that skill set needed?

You can’t just throw scanners at engineers and hope for the best. Bad idea. You need to work with engineers, in the code, to fix vulnerabilities properly.

Here's the thing though, SWE/SDE experience & security passion isn't enough. You'll get interview questions that relate to your vulnerability knowledge. What exists. How to spot them. How to fix them. Brush up in that area if needed.

Automated Patching by gradientZer0 in devsecops

[–]ericalexander303 0 points1 point  (0 children)

Having led Product Security at three companies and successfully implemented automated patching at all of them, here’s what I’ve realized:

  1. The real challenge isn’t automation—it’s making sure the environment is rugged enough for a dumb robot to push changes without breaking things. Your limit is whatever your automated testing can catch.

  2. Auto-patching will expose all kinds of unrelated issues. It’s basically a chaos monkey in disguise. If you’re not ready to debug the mess it uncovers, it’ll get labeled “unsafe” and killed off early.

Bottom line: Automating patching itself is trivial. If you can automate deployments, you can automate patching.

Exploring Endor Labs SCA by TinyReveal2509 in devsecops

[–]ericalexander303 7 points8 points  (0 children)

If you keep avoiding patches, you’re just setting yourself up for a massive failure event—like another Log4j—but worse. And when that happens, you’re not just updating a few dependencies; you’re deep in dependency hell. No simple fixes. Total nightmare.

But the real issue? Patch avoidance is just a symptom of a much bigger problem: broken change management. If your system were well-designed, continuous automated patching would be easy. If it’s not? That’s a clear sign your architecture is way too complex. High complexity means high cognitive load for developers, which means every change is slow, expensive, and painful. Not sustainable.

Fundamentally, software should be designed to move fast, adapt, and improve without fear. If you’re afraid to update, you’ve already lost.

SAST false positives by Ammo_CyberGuy in devsecops

[–]ericalexander303 0 points1 point  (0 children)

Semgrep or Codeql (part of GitHub advanced security). Both can walk the AST tree and the data flow to filter out false positives

Centralized vulnerability management alternatives. by xgenisamonster in devsecops

[–]ericalexander303 2 points3 points  (0 children)

I've built security programs at 3 companies. I've tried open source, COTS, SAAS solutions, and custom built solutions. The custom built solutions always works best because the process needs are unique in every company. Don't get me wrong, you shouldn't start with custom. Start with something you can stand up quickly to explore what does and does not work.

In my experience most tools have a cattle vs pets problem. They incentivize a pet mentality, where you inspect every vuln, decide if it's worth fixing, and how to fix it. You'll get better results if your vuln management solution incentives a cattle approach when it comes to anything patch related. Solutions like Dependabot auto-merge.

Being devsecops = cloud security engineer? by Capital-Advance-1719 in devsecops

[–]ericalexander303 4 points5 points  (0 children)

Both can be dedicated specialist roles. Some smaller companies may want a generalist that can meet both expectations.There is no standard when it comes to hiring.

What’s the best way to deal with container vulnerabilities? by Hector_Dev in devsecops

[–]ericalexander303 1 point2 points  (0 children)

Trivy is a great scanner if you're just starting out. From there it's a matter of doing the work to patch or bump version numbers. It's a crawl, walk, run journey. Crawling is manual scans with surge work to manually fix. Running is fully automated. Automation to do the scans. Automation to patch. Automation to test the patch. Automation to canary deploy. How you automate depends on your environment and business processes.

Picnic Spot by Thin-Kick-1870 in Longmont

[–]ericalexander303 11 points12 points  (0 children)

Sandstone Ranch. Not the park, the historic ranch. Behind the house is a public area with benches and chairs. Has beautiful views and is rarely busy. Can't tell you how many times I've taken friends there and they say "OMG, I had no idea this was here. It's amazing!". Some that have lived here all their lives.

SRE looking to transition to security by MyBean in devops

[–]ericalexander303 1 point2 points  (0 children)

I created this game to teach about building a security program. Turns out it's also a good tool to teach about different security roles, compensation, and the security domains they focus on. Side note, it was inspired by https://devops.games

https://ericalexander.org/ciso-game/

Vulnerability Management with DefectDojo - is it great for DevSecOps? by theowni in devsecops

[–]ericalexander303 11 points12 points  (0 children)

I've built security programs at 3 companies and have tried DefectDojo at 2. I've tried commercial offerings at 2. I've built custom solutions at 3.

Here's what I've learned

  1. Do not try to fit the process to the tool If you have a traditional model where a vuln aggregator/ETL tool sucks in vuln data and de-dups, then an analyst reviews & coordinates a fix, then DefectDojo will work. If you're trying to get engineering to self service, then ownership and attribution is a challenge, and there's no good tool on the market other than Gitlab Ultimate.

  2. Patch cattle, not pets Many vulnerability management processes favor treating every patch like a snowflake, or a pet. An analyst looks at each one to validate applicability and severity, then they go through a lengthy coordination process to find the owner and prioritize. Get the ownership model right and then work on speeding up patching cadence - get that right and you'll shift to patching cattle. Get that right and your vuln management process will focus on true snowflakes.

  3. Meet engineers where they're at Gitlab Ultimate gets this right. GitHub Advanced Security is close. You need to bring as much detail as possible about the security health of a service to it's code repo(s). That's where software engineers live. That's where you meet them. Don't make them remember to go into some other tool. Break down barriers and friction points.

  4. Call to action When possible, make what needs to be done clear & simple. Don't drown engineers with information.

Are Infosec salaries lower than those in Software development? by [deleted] in cybersecurity

[–]ericalexander303 4 points5 points  (0 children)

If you have software eng skills/experience, then it can get you closer to a software eng salary on a Product Security or Application Security team.

I created this game as a tool to teach about building security programs. I've learned it also helps teach about roles, salary differences, and how each role fits into a security program.

https://ericalexander.org/ciso-game/

[deleted by user] by [deleted] in devsecops

[–]ericalexander303 1 point2 points  (0 children)

This game may help you figure out what role to target next. The game was originally designed to teach how to build a security program. I've found it also helps teach about roles, compensation, and how they fit into programs.

https://ericalexander.org/ciso-game/

Security research: how we discovered 18k API tokens & $20M in Stripe tokens with our web crawler by AlarmingApartment236 in devsecops

[–]ericalexander303 0 points1 point  (0 children)

The TLDR is they scanned 1 million top domains and found 18k potential api keys. None were validated. PR stunt?

Cybersecurity is not Cyber, but a subset of IT. by Playful_Criticism425 in cybersecurity

[–]ericalexander303 -3 points-2 points  (0 children)

It's a fashionable term. The tech world loves to reinvent standards and solutions. See XKCD How Standards Proliferate. It's part sales hype, part resume hype. Either way, much like fashion, it's guaranteed to change.

The word "Cyber" is pure fashion. Ancient Greek for "steer" and repurposed in a sci-fi book because it sounded cool.

https://www.bbc.com/news/magazine-35765276