Latest DevOps Articles

Latest DevOps Articles curated daily from around the web.


Control Objectives for Information and Related Technologies (COBIT) is a framework created by ISACA for developing, implementing, monitoring, and improving IT g...
Data collection is the gear that powers the modern internet. User data provides powerful behavioral insights, supercharges web analytics for tailored advertisem...
Curated backend podcasts, videos and articles. All free. If you're looking to become a backend developer, or just stay up-to-date with the latest backend techno...
Shirts painstakingly handcrafted by under-caffeinated developers. Shirts painstakingly handcrafted by under-caffeinated developers.
Effective mid-2024, newly released Amazon EC2 instance types will use only version 2 of the EC2 Instance Metadata Service (IMDSv2). We are also taking a series...
The year is coming to an end, and there are only 50 days until Christmas and 21 days to AWS re:Invent! If you are in Las Vegas, come and say hi to me. I will be...
The Higher Education Community Vendor Assessment Tool (HECVAT) is a security assessment template designed to simplify and standardize information security and d...
The European Union’s (EU’s) General Data Protection Regulation (GDPR) is one of the world's most robust data privacy laws.
Shirts painstakingly handcrafted by under-caffeinated developers. Shirts painstakingly handcrafted by under-caffeinated developers.
1.1. Have you implemented application control to prevent the execution of unapproved/malicious programs? 1.2. Are controls in place to ensure only approved soft...
The SolarWinds supply chain breach in December 2020 is among the most sophisticated and widespread cyber attacks ever deployed. The attack was estimated to have...
NIST 800-53 outlines a list of security controls for protecting federal information systems from cyber threats and vulnerabilities leading to data breaches.
Recent advancements in machine learning (ML) have unlocked opportunities for customers across organizations of all sizes and industries to reinvent new products...
Shirts painstakingly handcrafted by under-caffeinated developers. Shirts painstakingly handcrafted by under-caffeinated developers.
A HIPAA (Health Insurance Portability and Accountability Act) questionnaire is essential for evaluating third-party vendors for healthcare organizations to ensu...
Curated backend podcasts, videos and articles. All free. If you're looking to become a backend developer, or just stay up-to-date with the latest backend techno...
It’s less than a month to AWS re:Invent, but interesting news doesn’t slow down in the meantime. This week is my turn to help keep you up to date! AWS re:Post –...
Transport Layer Security (TLS) provides security for internet communications.