The Difference Between Virtual Machines and Containers

Credit to Author: Chris Van Den Abbeele| Date: Thu, 12 May 2022 00:00:00 +0000

Discover the key differences, use cases, and benefits of virtual machines and containers.

Read more

Adding Guardrails To A Cloud Account After The Fact

Credit to Author: Melanie Tafelski| Date: Wed, 11 May 2022 00:00:00 +0000

This article outlines a priority checklist of which guardrails need to be applied to an existing cloud account. Answering questions like, can these guardrails be implemented without breaking anything? What level of testing is required?

Read more

Secure application development cloud best practices

Credit to Author: Tabitha Doyle| Date: Wed, 20 Apr 2022 00:00:00 +0000

The need for agility can often sideline security best practices; we explore how to build with security at the forefront without compromising time to delivery.

Read more

Cybersecurity Basics: Authentication and Authorization

Credit to Author: Melanie Tafelski| Date: Wed, 13 Apr 2022 00:00:00 +0000

With most security incidents caused by exposed secrets in DevOps pipelines and tools, proper authentication and authorization is essential. Explore the basics of strong identity management to build more resilient apps.

Read more

Terraform Tutorial: Drift Detection Strategies

Credit to Author: Michael Langford| Date: Mon, 28 Mar 2022 00:00:00 +0000

A fundamental challenge of architecture built using tools like Terraform is configuration drift. Check out these actionable strategies and steps you can take to detect and mitigate Terraform drift and manage any drift issues you might face.

Read more

Mitigate Top 5 Common Cybersecurity Vulnerabilities

Credit to Author: Melanie Tafelski| Date: Tue, 22 Mar 2022 00:00:00 +0000

Vulnerabilities in software and infrastructure are a fact of life for developers and SREs. But when you understand vulnerabilities, you can minimize their impact. Learn more about five common threats and how to mitigate them.

Read more