Latest DevOps Articles

Latest DevOps Articles curated daily from around the web.


Amazon Data Lifecycle Manager now supports the use of pre-snapshot and post-snapshot scripts embedded in AWS Systems Manager documents. You can use these script...
Curated backend podcasts, videos and articles. All free. If you're looking to become a backend developer, or just stay up-to-date with the latest backend techno...
Control Objectives for Information and Related Technologies (COBIT) is a framework created by ISACA for developing, implementing, monitoring, and improving IT g...
Fathom Analytics | Fast, simple and privacy-focused website analytics. Fathom Analytics | Fast, simple and privacy-focused website analytics.
Data collection is the gear that powers the modern internet. User data provides powerful behavioral insights, supercharges web analytics for tailored advertisem...
Curated backend podcasts, videos and articles. All free. If you're looking to become a backend developer, or just stay up-to-date with the latest backend techno...
Effective mid-2024, newly released Amazon EC2 instance types will use only version 2 of the EC2 Instance Metadata Service (IMDSv2). We are also taking a series...
The year is coming to an end, and there are only 50 days until Christmas and 21 days to AWS re:Invent! If you are in Las Vegas, come and say hi to me. I will be...
Fathom Analytics | Fast, simple and privacy-focused website analytics. Fathom Analytics | Fast, simple and privacy-focused website analytics.
The Higher Education Community Vendor Assessment Tool (HECVAT) is a security assessment template designed to simplify and standardize information security and d...
1.1. Have you implemented application control to prevent the execution of unapproved/malicious programs? 1.2. Are controls in place to ensure only approved soft...
The European Union’s (EU’s) General Data Protection Regulation (GDPR) is one of the world's most robust data privacy laws.
The SolarWinds supply chain breach in December 2020 is among the most sophisticated and widespread cyber attacks ever deployed. The attack was estimated to have...
Digital Ocean Providing developers and businesses a reliable, easy-to-use cloud computing platform of virtual servers (Droplets), object storage ( Spaces), and more.
NIST 800-53 outlines a list of security controls for protecting federal information systems from cyber threats and vulnerabilities leading to data breaches.
Recent advancements in machine learning (ML) have unlocked opportunities for customers across organizations of all sizes and industries to reinvent new products...
A HIPAA (Health Insurance Portability and Accountability Act) questionnaire is essential for evaluating third-party vendors for healthcare organizations to ensu...
Curated backend podcasts, videos and articles. All free. If you're looking to become a backend developer, or just stay up-to-date with the latest backend techno...