Video Hub
Browse through our knowledge hub for technical deep dives on Spinnaker, Argo, CI/CD, DevSecOps, AppSec, ASPM, Deployment Security, and more.
Jenkins Top 10 Security soft-spots | CI/CD Security Gaps | Jenkins security vulnerabilities
Weak authentication, plugin vulnerabilities, and insecure configurations are among the top 10 Jenkins security soft-spots. Learn more.
Why is the D-BOM (Delivery Bill of Materials) a game changer for AppSec and DevSecOps teams
OpsMx’s D-BOM, is a game-changer for DevSecOps and AppSec teams trying to ensure policy compliance at scale. Learn how it automates deployment checks & validates builds.
- All
- Argo
- ASPM
- Secure Software Delivery
- Spinnaker
- Please wait..
Jenkins Top 10 Security soft-spots | CI/CD Security Gaps | Jenkins security vulnerabilities
Weak authentication, plugin vulnerabilities, and insecure configurations are among the top 10 Jenkins security soft-spots. Learn more.
Understanding Security soft-spots of Jenkins | Importance of Jenkins security advisory
In SDLC, Jenkins and the entire Build process has become an easy cybersecurity attack surface. Learn why it must be secured.
Why does Jenkins make the Software Supply Chain vulnerable? | Jenkins security soft spots
Even though Jenkins is incredibly flexible, it introduces security risks, making the Software Supply Chain vulnerable to external and internal threats.
Unifying Security Management in SDLC: Challenges and Considerations
Discover the key factors to consider when choosing AppSec tools for your SDLC
The need for End-to-End Application Security Posture in SDLC
Discover the various attack vectors that threat actors can exploit in SDLC and why end-to-end application security posture management is key.
Why Secure the SDLC with Open Source Software and simplify Application Security
This video explores why you need to secure your SDLC and the role Open Source tools play a key role in ensuring Application Security.
Global View Of Application Security Program & Actionable Intelligence by OpsMx Delivery Shield
Explore how a security leader can get insights into AppSec posture (visibility, reporting, and monitoring data across SDLC stages.
Vulnerability Management by OpsMx Delivery Shield
Demo of OpsMx’s Delivery Shield aggregating data from different sources, correlating, prioritizing and remediating vulnerabilities.
Attack Surface, Vulnerability Detection and Automated Actions using OpsMx Delivery Shield
Explained! How Delivery Shield enforces policies to prevent vulnerabilities from entering across SDLC stages (code/build/artifact/deploy).
Policy and Security Frameworks Supported by OpsMx Delivery Shield
The flexibility of Policy enforcement agents to customize policies, and tailor severity levels to specific security needs, explained!
AppSec Challenge #4: Identifying & managing Security Vulnerabilities | Exception Management
Identifying the severity level of threats and how relevant it is for different Application teams is an actual AppSec problem at large enterprises.
AppSec Challenge #3: Understanding and Visualizing your SDLC Security Posture
Large enterprises struggle to get complete visibility into their SDLC security posture, making it difficult to implement an effective ASPM program.
AppSec Challenge #2: Gathering and synthesizing data from across the entire DevOps toolchain
Automating data collection and synthesis is key to a healthy AppSec posture. This video explains the challenge and solution to this process.
AppSec Challenge #1: Securing the End-to-End Software Delivery Process
Attacks are no longer just restricted to code; the attack surface can be anywhere across the entire SDLC, making end-to-end visibility essential.
Why is the D-BOM (Delivery Bill of Materials) a game changer for AppSec and DevSecOps teams
OpsMx’s D-BOM, is a game-changer for DevSecOps and AppSec teams trying to ensure policy compliance at scale. Learn how it automates deployment checks & validates builds.
Say goodbye to Audit nightmares with OpsMx’s Audit & Traceability features
Streamlined Audit reporting allows you to anticipate problems/risks, improves SDLC decision making and reduces time to investigate incidents. Learn how to transform audit nightmares into a good night's sleep.
Why ‘Security’ should not stop at build and extend through to ‘Deployment’
A poor security posture during the ‘build’ or ‘code commit’ stage could lead to a critical security threat by the time it gets deployed to prod. Ensuring image and artifact provenance is imperative.
Role of Security Guardrails & Automated Validations in Shift-left Security | DevOps Security
OpsMx experts explain why enforcing security guardrails and automated validations are the means to ensure compliant deployments. Listen to them explain why this is fundamental to ‘Shift-Left Security’.
Stick with what works – Guiding principles for Secure CI CD with OpsMx
Adapting to security threats without disrupting your existing CI/CD processes can be a challenge. OpsMx experts discuss how to enhance security while keeping your tried-and-true delivery and deployment process intact.
Retain Jenkins for CI, but improve security with other CD tools
OpsMx experts, Bob and David discuss how you can maximize Jenkins' potential and ensure its security. If you've invested time in Jenkins, let OpsMx help you make it even better!
Beyond the Build: Threat Actors & Battling CI/CD Blindspots
OpsMx experts discuss: Going beyond the build, how secure is your CI/CD process? From the inception of code to production, understanding end-to-end security is paramount.
Manual Approvals slowing down your DevOps pipelines?
Are ‘Manual’ approvals slowing down your DevOps? Learn how automated policy enforcement paves the way to break free from the DevOps bottlenecks from OpsMx experts!
Elevating ASPM with Real-time Monitoring for Dynamic Software Security
Monitoring for security threats in real-time is key if you are to maximize ASPM efforts. Watch this video to understand the importance of continuous monitoring.
Maximizing Deployment Security: A guide to exercise Security Controls and Best Practices
The ‘deployment’ phase can act as a key point of control to enforce security standards. Watch the video to learn more.
Integrating ASPM practices into Open Software Delivery (OpenCD) architecture
The most effective strategy to scale CD workflows in the long run, is to use open source tooling and integrate AppSec practices with open source tools. Learn more.
What is ASPM? (Application Security Posture Management) – Overview and Strategies of ASPM
ASPM is the process of analyzing security signals across the entire SDLC to understand application health, improve service visibility, and manage vulnerabilities.
OpsMx Spinnaker Open CD Architecture : Unified CD with DevOps Integrations
Spinnaker is a key component of an OpenCD Architecture. OpsMx enhances Spinnaker’s capabilities by focusing on security, visibility & delivery intelligence.
Enhanced Spinnaker Security/Security Update: UBI8 & Governance
Spinnaker is building a secure foundation for software delivery, and can be used in the deployment process to exercise security controls in the SDLC.
Spinnaker Metrics & Dashboard: Optimizing Continuous Delivery
Spinnaker's advanced metrics and dashboards offer unprecedented visibility into the release process ensuring efficient and scalable deployments.
Enhancing Spinnaker Usability: Kubernetes API Checks & More
Contributions from active users is what’s helping Spinnaker become a reliable and secure platform for deployments and a more user-friendly DevOps tool.
Optimizing Spinnaker: Enhancing Performance & Storage Integration
Spinnaker is very scalable thanks to its support for multi cloud deployments, ease to use for smaller deployments and efficiency during large-scale operations.
The Power of Spinnaker Community and Support
Thanks to frequent contributions from the open source community, Spinnaker not only sees performance improvements, but also security enhancements.
Power of Spinnaker – A Continuous Delivery (CD) Tool
Spinnaker is the most popular tool for CD. Originally developed by Netflix and later open sourced, teams around the world use it to automate software delivery.
OpsMx is Trusted
By Enterprises
Keep up to date with OpsMx
Be the first to hear about the latest product releases, collaborations and online exclusive.