I had the pleasure of joining some of my friends at Uptycs in a live panel discussion on securing the application development pipeline.
It's security week for cloud-native applications! Learn the Principle of Shared Responsibility and sign up for the "Basics of Cloud Security" email course.
Want to learn how to build security into your cloud-native application architecture? My latest course on cloud security basics will show you how.
For a company to be agile, we must allow teams to make the necessary choices to accomplish their goals. Yet agility requires choice, which leads to complexity. How do we solve this?
Microservices come in a variety of sizes. How can we determine the ideal size — the "Goldilocks Size" — for our microservices?
How do you perform privileged production activities when those working on the issue do not have privileged access? Permissions escalation!
There are many things you can do to keep microservices secure, including these two critical but often overlooked security strategies.
What on earth do cloud-native applications have in common with nuclear submarines? When it comes to security, turns out a lot.
Bad actors abound online, and securely maintaining your cloud-native apps is no easy task. Learn about one technique that's often overlooked.