The Difference Between Virtual Machines and Containers

Credit to Author: Chris Van Den Abbeele| Date: Thu, 12 May 2022 00:00:00 +0000

Discover the key differences, use cases, and benefits of virtual machines and containers.

Read more

Adding Guardrails To A Cloud Account After The Fact

Credit to Author: Melanie Tafelski| Date: Wed, 11 May 2022 00:00:00 +0000

This article outlines a priority checklist of which guardrails need to be applied to an existing cloud account. Answering questions like, can these guardrails be implemented without breaking anything? What level of testing is required?

Read more

Cybersecurity Basics: Authentication and Authorization

Credit to Author: Melanie Tafelski| Date: Wed, 13 Apr 2022 00:00:00 +0000

With most security incidents caused by exposed secrets in DevOps pipelines and tools, proper authentication and authorization is essential. Explore the basics of strong identity management to build more resilient apps.

Read more

Terraform Tutorial: Drift Detection Strategies

Credit to Author: Michael Langford| Date: Mon, 28 Mar 2022 00:00:00 +0000

A fundamental challenge of architecture built using tools like Terraform is configuration drift. Check out these actionable strategies and steps you can take to detect and mitigate Terraform drift and manage any drift issues you might face.

Read more

Mitigate Top 5 Common Cybersecurity Vulnerabilities

Credit to Author: Melanie Tafelski| Date: Tue, 22 Mar 2022 00:00:00 +0000

Vulnerabilities in software and infrastructure are a fact of life for developers and SREs. But when you understand vulnerabilities, you can minimize their impact. Learn more about five common threats and how to mitigate them.

Read more

What is a cloud native application protection platform (CNAPP)?

Credit to Author: Michael Langford| Date: Wed, 09 Feb 2022 00:00:00 +0000

We explore CNAPP, the latest industry acronym coined by the Gartner report Innovation Insight for Cloud-Native Application Protection Platforms, and why devs need to know about it.

Read more

5 Cloud Native Security Platform Must-haves

Credit to Author: Melanie Tafelski| Date: Wed, 02 Mar 2022 00:00:00 +0000

Discover 5 key security components to review and how to leverage a cloud native security platform with Mick McCluney (Trend Micro) and Kelly Griffin (AWS).

Read more

A Guide to the Well-Architected Framework

Credit to Author: Melissa Clow| Date: Wed, 16 Feb 2022 00:00:00 +0000

Discover the six pillars of the Amazon Web Services (AWS) and Azure Well-Architected Framework, examining best practices and design principles to leverage the cloud in a more efficient, secure, and cost-effective manner.

Read more