Tag: Articles
-
Article: Generative AI: Shaping a New Future for Fraud Prevention
This is a summary of a talk I gave at QCon SF in October 2023. The complexity of fraudulent actions is rising along with the expansion of …
-
Article: From Compliance-First to Risk-First: Why Companies Need a Culture Shift
Introduction Compliance is fundamental to modern business operations and integral to their success. It involves adhering to legal and …
-
Article: Debugging Production: eBPF Chaos
This article shares insights into learning eBPF as a new cloud-native technology which aims to improve Observability and Security …
-
Article: Learning eBPF for Better Observability
This article shares insights into learning eBPF as a new cloud-native technology which aims to improve Observability and Security …
-
Article: When DevOps Meets Security to Protect Software
I have now been working in cybersecurity for about two years and the lessons have been immense. During this time, my morning routine has …
-
Article: The Process of Creating Decentralized Apps (dApps)
A decentralized application has a different architectural approac, they are working on distributed ledger technology called blockchain, …
-
Article: Secure Delivery: Better Workflows for Secure Systems and Pain-Free Delivery
The software delivery process has been transformed in the last decade; we’ve adopted well-understood workflows around functions such as …
-
Draft Blog Article to Duplicate
Title of article Paragraph stating the thesis of the article and supporting points. What Should You …
-
Article: Data Protection Methods for Federal Organizations and Beyond
Data loss or theft is a highly probable and ugly eventuality, which is a problem for those in charge of preventing data breaches. Some of …
-
Article: The Importance of Pipeline Quality Gates and How to Implement Them
A quality gate is an enforced measure built into your pipeline that the software needs to meet before it can proceed to the next step. This …
-
Article: API Security: From Defense-in-Depth (DiD) To Zero Trust
Nearly all companies have experienced security incidents but few have an API security policy that includes dedicated API testing and …
●●●