Agile Architecture | Agile Transformation | DevOps | Security
The shift left fallacy Edzo Botjes 27 Aug, 2021
Cloud | Google Cloud Platform | Security | Technology
How to connect to CloudSQL with IAM authentication Mark van Holsteijn 19 May, 2021
AWS | Cloud | Cloud Security | Security
Defense in depth matters Steyn Huizinga 17 May, 2021
DevSecOps | Security
Secure Deployment: 10 Pointers on Secrets Management AWS | Cloud | Cloud Security | Security
Optimizing your security footprint in AWS — Part 2 Steyn Huizinga 07 Apr, 2021
AWS | Cloud | Cloud Security | Security
Optimizing your security footprint in AWS — Part 1 Steyn Huizinga 01 Apr, 2021
Google Cloud Platform | Security | Technology
How to create your own Google service account key file Mark van Holsteijn 08 Mar, 2021
DevSecOps | Security | Sociotechnical
Improving Security by influencing Human Behavior Edzo Botjes 19 Feb, 2021
DevSecOps | Security
Threat modeling without a diagram Dave van Stein 05 Feb, 2021
Continuous Delivery | DevSecOps | Security
From Build to Run: Pointers on Secure Deployment Agile Transformation | DevSecOps | Security
Threat Modeling - Start using evil personas Dave van Stein 30 Nov, 2020
Agile Transformation | DevSecOps | Security
Security by design? Don't create a YAPWAV! Dave van Stein 23 Nov, 2020
AWS | Cloud | Security
How to configure a SAML identity provider to enable SSO in AWS CloudFormation Mark van Holsteijn 24 Jul, 2020