What did your developer violate today?
Building Secure and Efficient Alexa Skills
This blog walks through steps to build and secure Alexa Skills
AWS Keys + Github = Disaster (Don't Be Like Me)
How to detect and prevent data breaches in AWS?
AWS Secrets Manager vs HashiCorp Vault
VMware Secure State
Relationships and Connected Threats in the Public Cloud
Implementing a Continuous Security Model in the Public Cloud with Jenkins and Terraform: Part-2
This blog walks through step by step implementation of a CI/CD pipeline for the Continuous Security process
Implementing a Continuous Security Model in the Public Cloud with Jenkins and Terraform : Part-1
CIS Benchmarks for AWS with CloudHealth and VMware Secure State
Being Budget Conscious in a Continuously Automated World
Fences and Gates: Designing Operations for the Multi-Cloud World
Cloud Journey IO© 2019 All Right Reserved