Security3
Maintaining the security of your application and data is critical. Learn how to implement security best practices and automate security scans with CI/CD.
![2019-08-19-Contrast](https://ctf-cci-com.imgix.net/1oAPRAibYLq9e3j7v7e2HT/b9f857bbc3656a73d4dbe7f83b730a99/2019-08-19-Contrast.jpg?ixlib=rb-3.2.1&w=2000&auto=format&fit=max&q=60)
CI/CD, meet CAS: Continuous Application Security
![Nikesh Shah](https://ctf-cci-com.imgix.net/ItlD3nGclGYdcUASNmmgR/7e172763782cd615e15603dda253514c/nikesh-shah.jpg?ixlib=rb-3.2.1&w=2000&auto=format&fit=max&q=60)
Director of Business Development and Strategic Alliances at Contrast Security
![2019-08-17-CryptoMove](https://ctf-cci-com.imgix.net/16ZjJjY9o2ucAYiO2kqG7k/8a23a36e0b6d6d1a466e441c224634e7/2019-08-17-CryptoMove.jpg?ixlib=rb-3.2.1&w=2000&auto=format&fit=max&q=60)
Pull in your stored sensitive data with the CryptoMove orb
![Nicholas Shook](https://ctf-cci-com.imgix.net/4DPImmwcV0imw5EkzKPZoc/79a073a4bd708e51788084707f9248c9/nicholas-shook.jpg?ixlib=rb-3.2.1&w=2000&auto=format&fit=max&q=60)
Solutions Engineer at CryptoMove
![2019-08-17-Probely](https://ctf-cci-com.imgix.net/60I7q464uuhdQ3uwnBOVbm/b50b5daf744e477f62d00c94fe3b64c4/2019-08-17-Probely.jpg?ixlib=rb-3.2.1&w=2000&auto=format&fit=max&q=60)
Three rules for turning DevOps into DevSecOps
![Davor Petreski](https://ctf-cci-com.imgix.net/2yeVd1PYLiqrEVSyiRnOj8/63c0723bd11b8cae550fc4e746737173/davor-petreski.jpg?ixlib=rb-3.2.1&w=2000&auto=format&fit=max&q=60)
Content Marketing at Probely
![rba-security-devsecops.jpg](https://ctf-cci-com.imgix.net/575Iq8OKkqwUwzZR1rmEoH/8b94ff3f0858cf5654b728678198ca40/rba-security-devsecops.jpg?ixlib=rb-3.2.1&w=2000&auto=format&fit=max&q=60)
Build with CircleCI, configure securely with Alcide
![Karine Regev](https://ctf-cci-com.imgix.net/5a8zVx50DEBU7RelroXWOh/e56579c99ad4bc7e6e6970d2481bade9/karine-regev.png?ixlib=rb-3.2.1&w=2000&auto=format&fit=max&q=60)
VP of Marketing at Alcide
![Developer A sits at a desk working on an intermediate-level project.](https://ctf-cci-com.imgix.net/3FPR2tmaqQeWPvKBQWQjTb/17ead46fd065f2f4c0fdf9447f2e3325/Tutorial-Intermediate-A.jpg?ixlib=rb-3.2.1&w=2000&auto=format&fit=max&q=60)
Security scans with Snyk in a CircleCI workflow
![Tomás Gonzalez](https://ctf-cci-com.imgix.net/39hPzwxtPqgVLPtK56vfaZ/8c5fea5f75a6d669ddcf733a2d3bcf27/tomas-gonzalez.jpg?ixlib=rb-3.2.1&w=2000&auto=format&fit=max&q=60)
Partner Solutions Architect at Snyk
![Monitors with stylized lines of code on a grid scattered with geometric shapes.](https://ctf-cci-com.imgix.net/45PA6DDhlhTlOdmqfDwiAk/186f7cf9a55d523d4385b2d2dd1682e2/Default-Abstract-GreenBG-v2.jpg?ixlib=rb-3.2.1&w=2000&auto=format&fit=max&q=60)
WhiteSource launches free open source vulnerability checker orb for all CircleCI users
![Shiri Ivtsan](https://ctf-cci-com.imgix.net/4MJ2zJPNc8NCZeNIIfBvPf/0083e26b092b09f53faf8d4db53ea5e2/shiri-ivtsan.jpg?ixlib=rb-3.2.1&w=2000&auto=format&fit=max&q=60)
Product Manager at WhiteSource