Create a Serverless AWS EKS Cluster using Pulumi
This week at AWS Re:Invent 2019, Fargate support for the Elastic Kubernetes Service (EKS) ...
Your PM and Tech Teams are Tanking Your Projects [and it’s Not Why You Think]
Despite the fact that we all know what PMs do and involve them in our work accordingly, ...
A Comparison of Secrets Managers for AWS
There are many options to manage your secrets in the cloud. We examine 3 of the most ...
How I Passed the CISSP
My personal experience with the CISSP by Jason Dyke.
Hacking AWS with Pacu
There are a lot of lessons to be learned from the Capital One incident that was disclosed ...
Practical, Proactive Amazon S3 Security
Before you go shopping, let’s take a look at what you already have at your disposal to ...
GDPR- So What’s “Compliant,” Anyway?
While GDPR doesn’t yet have a formal, certifying body, it can be part of a robust ...
Encryption in The Cloud Pt. 1
This is the first of a multipart dive into encryption in the public cloud. Part 1 will ...
Why a compliance strategy should be important to executives
Why is having a cohesive compliance strategy as a business or product executive ...
GCP Shielded VM — Integrity Monitoring
Google Cloud announced Shielded VM all the way back at NEXT ’18 and it went GA at NEXT ...