- Tests from the crypt: Think of chaos engineering as unit testing your monitoring and alerting—or as exorcising your haunted house by Tammy Butow
- Testing the boundaries of collaboration by Kent Beck
- Scenarios using custom DSLs: Writing BDD scenarios with a simple DSL rather than Gherkin by Liz Keogh
- 2019 Accelerate State of DevOps Report by DevOps Research and Assessment (DORA)
- Rate-limiting strategies and techniques by Preston Holmes
- Got microservices? Service mesh management might not be enough by Greg Kuelgen
- How Google Turned Kubernetes into a Control Plane to Manage GCP Resources by Janakiram MSV
- Reasons for Cancelling a Move to Microservices by Jan Stenberg
- Modular Monolith with DDD by Kamil Grzybek
- Don't get locked up into avoiding lock-in by Gregor Hohpe
- Modern applications at AWS by Werner Vogels CTO - Amazon.com
- Announcing etcd 3.4 Authors: Gyuho Lee (Amazon Web Services, @gyuho), Jingyi Hu (Google, @jingyih)
- Choosing a cloud DBMS: architectures and tradeoffs by Adrian Colyer
- Exposing microservices running in AWS EKS with a microservices/API gateway like Solo Gloo by Christian Posta
- Golang: Module Mirror and Checksum Database Launched by Katie Hockman
- GopherCon 2019 - How I Write HTTP Web Services after Eight Years by Mat Ryer
- A very deep dive into iOS Exploit chains found in the wild by Ian Beer, Project Zero
- Awesome Security Audits by Bobby DeSimone (pomerium)
- The JPMS Maturity Model by Nicolai Parlog
- Rabbit Holes: The Secret to Technical Expertise by Charles Ulrich
- Unveiling Elite Developers' Activities in Open Source Projects by Zhendong Wang, Yang Feng, Yi Wang, James A. Jones, David Redmiles
- How to Secure a GraphQL API (The Complete Vulnerability Checklist) by leapgraph
- Discovering GraphQL endpoints and SQLi vulnerabilities by Matías Choren
- GraphQL abuse: Bypass account level permissions through parameter smuggling by Jon Bottarini
- GraphQL Security Research Material by Doyensec
- Kotlin 1.3.50 released
- Amazon SQS and AWS X-Ray
Tune in for AWS Security LIVE!
Join AWS Security LIVE! for expert insights and actionable tips to protect your organization and keep security teams prepared.
For further actions, you may consider blocking this person and/or reporting abuse
Top comments (0)