Join us

ContentUpdates and recent posts about checkov..
ย Activity
@sanjayjoshi started using tool Shadcn Space , 2ย weeks, 4ย days ago.
Story Trending
@laura_garcia shared a post, 2ย weeks, 5ย days ago
Software Developer, RELIANOID

๐˜—๐˜ฐ๐˜ด๐˜ต-๐˜˜๐˜ถ๐˜ข๐˜ฏ๐˜ต๐˜ถ๐˜ฎ ๐˜Š๐˜ณ๐˜บ๐˜ฑ๐˜ต๐˜ฐ๐˜จ๐˜ณ๐˜ข๐˜ฑ๐˜ฉ๐˜บ: Preparing for ๐˜๐—ต๐—ฒ ๐—ก๐—ฒ๐˜…๐˜ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—˜๐—ฟ๐—ฎ

๐Ÿš€ ๐˜—๐˜ฐ๐˜ด๐˜ต-๐˜˜๐˜ถ๐˜ข๐˜ฏ๐˜ต๐˜ถ๐˜ฎ ๐˜Š๐˜ณ๐˜บ๐˜ฑ๐˜ต๐˜ฐ๐˜จ๐˜ณ๐˜ข๐˜ฑ๐˜ฉ๐˜บ: Preparing for ๐˜๐—ต๐—ฒ ๐—ก๐—ฒ๐˜…๐˜ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—˜๐—ฟ๐—ฎ Quantum computers are approaching, and with them comes a threat to traditional encryption like RSA and ECC. At ๐—ฅ๐—˜๐—Ÿ๐—œ๐—”๐—ก๐—ข๐—œ๐——, weโ€™re taking action now to ensure your infrastructure stays secure in a post-quantum world. How weโ€™re prepar..

ย Activity
@oseweka2 started using tool Trivy , 2ย weeks, 6ย days ago.
ย Activity
@oseweka2 started using tool Terraform , 2ย weeks, 6ย days ago.
ย Activity
@oseweka2 started using tool Sonatype Nexus , 2ย weeks, 6ย days ago.
ย Activity
@oseweka2 started using tool SonarQube , 2ย weeks, 6ย days ago.
ย Activity
@oseweka2 started using tool Prometheus , 2ย weeks, 6ย days ago.
ย Activity
@oseweka2 started using tool Kubernetes , 2ย weeks, 6ย days ago.
ย Activity
@oseweka2 started using tool Jenkins , 2ย weeks, 6ย days ago.
ย Activity
@oseweka2 started using tool Grafana , 2ย weeks, 6ย days ago.
Checkov, created by Bridgecrew (now part of Palo Alto Networks), is an open source policy-as-code scanner for infrastructure-as-code frameworks. It analyzes Terraform, Kubernetes manifests, CloudFormation, Serverless, ARM, Docker, and other IaC formats to detect security, compliance, and configuration issues. Checkov uses a large library of built-in policies mapped to standards like CIS, PCI, SOC2, and NIST, and supports custom policies written in Python or YAML. It integrates seamlessly with CI pipelines, Git repos, and developer workflows, helping teams enforce secure-by-default cloud configurations before deployment. Its coverage, speed, and extensibility make it a flagship tool in cloud DevSecOps.