Cisco DevNet

March 24, 2022

DEVELOPER

5 Python Security Traps You Need to Avoid

Learn about five common Python mistakes that can cause serious vulnerabilities in production applications, and how to avoid them.

March 22, 2022

DEVELOPER

Automation with Any Tooling on Any Interface

See how Terraform with IOS XE simplifies complex network configurations by orchestrating provisioning, configuration, and state management - in the cloud, on-prem in the campus enterprise network, or in the data center.

March 21, 2022

DEVELOPER

Policy as Code and the Open Policy Agent

See how policy-as-code plays out in Kubernetes — what comes built-in with Kubernetes, and how the Open Policy Agent with Gatekeeper helps Kubernetes operators take policy enforcement further.

March 15, 2022

DEVELOPER

Use “Scorecards” to Check on Security of Your Open Source Projects

Watch the Snack Minute interview with Stephen Augustus, Head of Open Source at Cisco, about Scorecard and how you use them to improve the security of your project.

March 14, 2022

DEVELOPER

Run Your IoT Applications on an IP67 Industrial Router

Try out all the programmability features of the Cisco IoT gateway, Industrial Router IR8140, in the DevNet Sandbox.

March 10, 2022

DEVELOPER

Take a Look at Cisco ThousandEyes for Cloud Developers

Learn about Cisco ThousandEyes, a SaaS solution for monitoring availability, latency, loss, and user experience with your web-based application in a distributed environment.

March 9, 2022

DEVELOPER

Try Automating a YubiKey Button Press

YubiKey is a device that enables two-factor authentication using a single button, by generating unique codes that confirm your identity. Here's a fun challenge you can try to automate a YubiKey.

March 7, 2022

DEVELOPER

Cisco Cloud Native Security – Part 3, GitOps and CI/CD

Learn how to deploy Infrastructure as Code (IaC) using GitOps as an operational framework that applies DevOps best practices to infrastructure automation.

March 7, 2022

DEVELOPER

Explore Secure DDoS Edge Protection with new Sandbox and Learning Labs

Learn how to protect a mobile edge network environment from malicious attacks hidden inside GTP packets. Then use the sandbox to test your solution.