Security
Articles, webinars, videos
Switching cloud infrastructure solutions? Follow these three steps.
4 mins
02 Nov 2022
Article
CONTENT SPONSORED by PLATFORM.SH
Switching cloud infrastructure solutions? Follow these three steps.
Chad
Carlson
Born-left security: The new approach taking over shift-left
9 mins
30 Aug 2022
Article
Born-left security: The new approach taking over shift-left
Aviram
Shmueli
Everything you need to know from 'Removing the barrier between security and engineering’
5 mins
23 Mar 2022
Article
CONTENT SPONSORED by STACKHAWK
Everything you need to know from 'Removing the barrier between security and engineering’
Ella
Morrish
Six ways security teams can build better relationships with engineering
6 mins
16 Mar 2022
Article
CONTENT SPONSORED by STACKHAWK
Six ways security teams can build better relationships with engineering
Shirish
Padalkar
Who is responsible for open source security?
9 mins
02 Mar 2022
Article
CONTENT SPONSORED by SHIFTLEFT
Who is responsible for open source security?
Chetan
Conikee
Shifting left on security: Five steps to transformation
16 mins
02 Mar 2022
Article
CONTENT SPONSORED by STACKHAWK
Shifting left on security: Five steps to transformation
Jeremy
Goldsmith
The four pillars of code health
7 mins
30 Nov 2022
Article
CONTENT SPONSORED by DEEPSOURCE
The four pillars of code health
Sanket
Saurav
Four things you need to know from ‘Using open source safely and effectively’
4 mins
05 Apr 2022
Article
CONTENT SPONSORED by SHIFTLEFT
Four things you need to know from ‘Using open source safely and effectively’
Ella
Morrish
Supporting, influencing, and leading as a security practitioner
14 mins
11 Mar 2022
Article
CONTENT SPONSORED by STACKHAWK
Supporting, influencing, and leading as a security practitioner
Izar
Tarandach
Plug in to LeadDev
Want to get regular updates on all things LeadDev? Sign up to our mailing list
To find out more about how your data is handled check out our Data Promise