top of page
Search
Jan 13, 2023
What did AWS Re: Invent bring us in terms of Security?
Re: Invent is the most anticipated event by the AWS community, not only because of the networking and relationships that are based there...
Oct 13, 2022
Best Security Practices, Well-Architected Framework
Understanding good practices is essential to do a job well and above all it is even more important if we talk about security issues,...
Jun 28, 2022
How to create SSL certificates from a 3rd party— and not fail in the process
During the last days of the past year, I received the request of updating SSL certificates, probably, like most of you. As we know...
May 31, 2022
Data Encryption at Rest
One of the most important parts of any architecture is data protection and encryption, when used correctly, can provide an additional...
Oct 27, 2021
How to secure your business? Is your data secure?
One of the main concerns of a company when deciding to move part or all of its computing and data management resources to a cloud...
Oct 6, 2021
CyberSecurity Month: Tips to avoid being phished
October is Cybersecurity Awareness Month. And just today, Twitch has been breached, badly. How does this relate to phishing, you wonder?...
Jul 27, 2021
Reminder: Rotate Your GitHub Tokens for Pipeline Security
Everybody knows the inconvenience of working with secrets like Tokens or Webhooks: You need to create them, save them in the Parameter...
Jun 8, 2021
Getting into your instances
Did you get excited about this article? Let’s have a look at how it is on a less theoretical level. Ok, so you have created an...
Jun 7, 2021
Advanced Direnv for Devops
Now you are using Direnv to manage your workspaces, but you stumble upon a difficulty, maybe motivated (like me) by Terraform workspaces....
Jun 2, 2021
Direnv for DevOps
For DevOps engineers, working on many different projects and different clouds is a reality of life. We have developed many tools to help...
bottom of page