Tired of Messy Code? Master the Art of Writing Clean Codebases

Fed up with chaotic code? Learn the skill of crafting tidy, easy-to-manage codebases. Gain valuable tips on writing code while collaborating in a team setting. Read all

WebAuthn Conditional UI: Technical Explanation and Implementation

Conditional UI enhances WebAuthn by enabling a passkey autofill for users, improving UX and authentication flow. This article guides you through its implementation. Read all

Connecting the Dots: Unraveling IoT Standards and Protocols

MQTT facilitates efficient messaging, HTTP/HTTPS connects devices, and TLS ensures secure data exchange—integral components shaping the IoT's future. Read all

Everything You Need to Know and Do With Load Balancers

Get the most out of Load Balancers with a Cloud Architect, covering hardware, software, protocols, and cloud optimization. Read all

A Tale of Two Intersecting Quality Attributes: Security and Performance

An opinion on balancing the security and performance aspects, which are two critical quality attributes for any system design. Read all

How to Design and Implement Automated Security Workflows

Automated security workflows boost efficiency and accuracy in security. Learn which workflows to automate and how to implement and maintain these workflows. Read all

From Ransomware to Ransom Nations: Everything You Need to Know About State-Sponsored Cyberattacks

Learn about state-sponsored cyberattacks, their tactics, and their impact. Stay informed about cybersecurity threats. Read all

Giving Power Back to Your Users With Flow’s Account Model

Read all

DEF CON 31: A Hot Time in the Las Vegas Heat and Some Cool Days in AppSec Village

DEF CON 31 was a unique experience. Read highlights from GitGuardian's time in Las Vegas, AppSec Village, the Hunt the Hacker CTF, insightful talks, and fun. Read all

cdCon + GitOpsCon: Co-evolving Open Source DevOps Communities in One Conference

The CD Foundation and OpenGitOps communities joined forces in Vancouver to create cdCon + GitOpsCon for a conference about the future of DevOps tooling. Read all

Function’s Anatomy and Beyond

Learn more about Java functions and much more. Read all

Implementing Stronger RBAC and Multitenancy in Kubernetes Using Istio

Learn how to use Istio service mesh on top of K8s auth to implement stronger RBAC and multitenancy for Kubernetes workloads. Read all

Breach and Attack Simulation Technology (Short Version)

This article explores the importance of demonstrating cybersecurity effectiveness and the role of Breach and Attack Simulation (BAS) technology. Read all

 

 

 

 

Top