Published in1st CoffeeOn “Against best practices”Recommend an article on “not blindly trust best practices” and share some critical thoughts on it. Somewhat philosophical, too.Nov 28Nov 28
Published in1st CoffeeOn “Disabling Scheduled Dependency Updates”Today I will recommend a good article to you and share some of my thoughts on dependency updates.Nov 28Nov 28
Published in4th CoffeeHow to Handle Secrets in GoLearn the best practices for handling secrets in Go in the cloud-native ecosystem.Sep 19Sep 19
Published in4th CoffeeA Brief Introduction to Multicloud SecurityWhat multicloud is, challenges, security concerns, and best practices towards a secure multicloud architecture.Sep 3Sep 3
Published in4th CoffeeDependency Confusion Attacks and Prevention: Register Your Private Package NamesDependency confusion attacks exploit gaps in your software supply chain. Modern dependency management and best practices explained.Aug 252Aug 252
Published in2nd CoffeeAn Even Better Way to Cut Weight — Inner TubesForget about tyres. Inner tubes are an even better way for weight-saving. Let’s take a deep look with concrete numbers.Jul 28Jul 28
Published in4th CoffeeContainer Security Scanning: Vulnerabilities, Risks and ToolingContainer vulnerabilities and container security scanning: tools, SCA, runtime security, and more.Jul 262Jul 262
Published in4th CoffeeHow to Handle Secrets in Jupyter NotebooksFrom entering passwords to using secret managers, this guide covers best practices for protecting sensitive info in your noteboooks.Jun 11Jun 11
Published in4th CoffeeOpen-Source Software SecurityLearn about vulnerabilities, dependencies, and tools to improve open-source software security in this in-depth blog post.May 131May 131
Published inGitGuardianPulumi VS Terraform: The Definitive Guide to Choosing Your IaC ToolThe definitive showdown between Pulumi and Terraform. Tips and FAQ included. Choose the right tool for the job.Feb 271Feb 271