The 'castle and moat' is a myth. With 80% of traffic moving laterally, your biggest threat is already inside your perimeter.
#1about 3 minutes
The cultural shift from DevOps to DevSecOps
DevOps succeeded by fostering a culture of shared responsibility, and now security must be integrated to break down the final silo.
#2about 8 minutes
Integrating security into requirements and design phases
Proactively address security by defining abuse cases during requirements and classifying or anonymizing data during the design phase.
#3about 5 minutes
Hardening the CI/CD pipeline with automated security tools
Shift security left by integrating automated vulnerability management for dependencies and continuous penetration testing into the CI/CD process.
#4about 3 minutes
Why traditional firewalls fail against internal east-west traffic
Most network traffic occurs internally between services (east-west), bypassing perimeter firewalls and exposing a soft interior to application-level attacks.
#5about 3 minutes
Moving from perimeter defense to workload microsegmentation
Protect against internal threats by decoupling security from the network and applying logical firewalls directly to each workload through microsegmentation.
#6about 4 minutes
Applying Zero Trust principles with security as code
Implement a Zero Trust model by having developers define workload communication intentions as code, which automatically generates and enforces security policies.
#7about 2 minutes
The benefits of a modern workload-centric security architecture
Adopting a Zero Trust, workload-centric model provides benefits like increased agility, complete application-level visibility, automated compliance, and real-time forensics.
#8about 1 minute
A developer's responsibility to build secure software
Developers must take ownership of security by adopting a paranoid mindset to build more resilient software in an increasingly dangerous cloud environment.
Related jobs
Jobs that call for the skills explored in this talk.
Dev Digest 216: CyberSec + Mythos, Stack Overflow for Agents & DOOM in TTFInside last week’s Dev Digest 216 .
🧠 Prompts are now tools in Chrome
📜 The AI Coding Agent Manifesto
🔐 How Claude Mythos changes Cyber Security
🧱 GitHub Stacked PRs to battle AI slop
⚙️ Git commands to run before reading code
🐍 A Python framework f...
Daniel Cranney
Dev Digest 191: Malware interviews, EU ❤️ Open Source and Skilled AgentsInside last week’s Dev Digest 191 .
💻 Want to write for the WeAreDevelopers Magazine?
⚒️ Claude skills - a less token hungry MCP?
🫰 How much does Cursor spend on AWS?
🧠 LLMs and Brain Rot
🟥 Change your NPM tokens now!
🧑 Fake AI recruiters delivering...
Daniel Cranney
The Overflow: 5 Security and Privacy Tools for DevelopersWe’re back again with another edition of the Overflow, where we share some of the best tools we’ve found from around the web that we just couldn’t cram into the already jam-packed editions of the Dev Digest.
So let’s take a look at five security and ...
Daniel Cranney
Dev Digest 214: Claude Is Leaking, GitHub Is Listening & Axios Hacked!Inside last week’s Dev Digest 214 .
🕵️ Claude source code leaked, analysed and re-written in 2 days
🐙 GitHub auto-opts users into feeding their code to train their AI
🌐 Pretext shows how to show complex text rendering in the browser
🤖 How to securin...
From learning to earning
Jobs that call for the skills explored in this talk.