Security
Articles, webinars, videos


The four pillars of code health
7 mins
30 Nov 2022
Article
CONTENT SPONSORED by DEEPSOURCE
The four pillars of code health

Sanket
Saurav
Switching cloud infrastructure solutions? Follow these three steps.
4 mins
02 Nov 2022
Article
CONTENT SPONSORED by PLATFORM.SH
Switching cloud infrastructure solutions? Follow these three steps.

Chad
Carlson
Four things you need to know from ‘Using open source safely and effectively’
4 mins
05 Apr 2022
Article
CONTENT SPONSORED by SHIFTLEFT
Four things you need to know from ‘Using open source safely and effectively’
.png)
Ella
Morrish
Everything you need to know from 'Removing the barrier between security and engineering’
5 mins
23 Mar 2022
Article
CONTENT SPONSORED by STACKHAWK
Everything you need to know from 'Removing the barrier between security and engineering’
.png)
Ella
Morrish
Supporting, influencing, and leading as a security practitioner
14 mins
11 Mar 2022
Article
CONTENT SPONSORED by STACKHAWK
Supporting, influencing, and leading as a security practitioner

Izar
Tarandach
Who is responsible for open source security?
9 mins
02 Mar 2022
Article
CONTENT SPONSORED by SHIFTLEFT
Who is responsible for open source security?

Chetan
Conikee
Born-left security: The new approach taking over shift-left
9 mins
30 Aug 2022
Article
Born-left security: The new approach taking over shift-left

Aviram
Shmueli
Six ways security teams can build better relationships with engineering
6 mins
16 Mar 2022
Article
CONTENT SPONSORED by STACKHAWK
Six ways security teams can build better relationships with engineering

Shirish
Padalkar
Shifting left on security: Five steps to transformation
16 mins
02 Mar 2022
Article
CONTENT SPONSORED by STACKHAWK
Shifting left on security: Five steps to transformation

Jeremy
Goldsmith
Plug in to LeadDev
Want to get regular updates on all things LeadDev? Sign up to our mailing list
To find out more about how your data is handled check out our Data Promise

