![](https://blogs.sas.com/content/subconsciousmusings/files/2023/06/security.jpg)
Automating a shift-left CI/CD security workflow to track, report, and analyze software security vulnerabilities
SAS' Phuong Ngo demonstrates an automated shift-left CI/CD security workflow.