Operations | Monitoring | ITSM | DevOps | Cloud

CI CD

The latest News and Information on Continuous Integration and Development, and related technologies.

Demo of Jira Software's CI/CD integration | Atlassian

Integrating your CI/CD tools with Jira Software is one of the easiest things you can do to get more value out of Jira Software for free, whether you’re using Bitbucket Pipelines, GitHub, GitLab, Jenkins, CircleCI, Octopus Deploy or others. Did you know that integrating your CI/CD tools with Jira Software unlocks several highly valuable and free native Jira Software features? During this office hours, we demo and talk through.

Pipelines Full of Context: A GitLab CI/CD Journey

Do you know what version of your software is running in production? How often is that software deployed, and was it deployed right before last week’s p0 incident? What sort of dependencies are being deployed along with that software, and are any of them potential security risks? These are all common observability questions that may be difficult to answer.

A guide to dynamic application security testing (DAST)

Dynamic application security testing (DAST) is a critical security measure for modern software delivery pipelines. It involves evaluating the security of web applications by actively testing them in real-time, simulating real-world attacks to identify vulnerabilities. As the cybersecurity threat landscape has evolved, DAST has emerged as a key tool for enforcing application security in continuous integration and continuous delivery (CI/CD) pipelines.

From Git to Kubernetes

Join our webinar to learn best-practices when using the JFrog Platform to store and manage your Docker images and Kubernetes deployments from beginning to end, while also setting up a continuous build, test and deploy pipeline. We’ll cover best practices for managing and creating Docker registries and Helm repositories, testing and promotion of Docker containers, and taking your containers all the way to production using the JFrog Platform and Kubernetes together.

Using Docker Desktop and Artifactory for Enterprise Container Management

As the prevalence of containers continues to expand, managing the push and pull of containers without an enterprise-grade container registry is unwieldy. Many companies utilize JFrog Artifactory as a Docker and Helm registry, but also utilize Docker Desktop strategically to manage their container services.

Impossible! Do Developers Really Mean This?

Impossible! Do software developers really mean this when they're estimating projects? Maybe, but they might not realize that even if a project is technically impossible, sometimes getting close is good enough. Here's part 2 of 4 of Sleuth's CTO and cofounder, Don Brown's take on decoding developer speak. Give Sleuth a try and see how we empower software teams to build faster by making engineering efficiency easy to improve and measurable — in a way that both managers and developers love.

Merging to Main #3: CI/CD Secrets

CI/CD Secrets are... well... secret (or at least they should be)! Think of all the credentials and tokens currently in use in your CI/CD pipeline. These secrets provide critical authentication for essential infrastructure like source control, environments, and build and deployment tools, but they can also easily expose you to risk. Having a secure secret management process is more important than ever for protecting your company and ensuring only authorized personnel can access them.

How to Secure Your CI/CD Pipeline: Best Tips and Practices

CI/CD pipelines have become a cornerstone of agile development, streamlining the software development life cycle. They allow for frequent code integration, fast testing and deployment. Having these processes automated help development teams reduce manual errors, ensure faster time-to-market, and deliver enhancements to end-users. However, they also pose risks that could compromise stability of their development ecosystem.