Why Least Privilege Security Engineering Is Frequently Skipped or Done Loosely In a previous life, I was on a team that reviewed the IAM policies...
Obscuring sensitive information like AWS account IDs in screenshots and videos is tedious and error-prone. Even with video editing tools that simplify...
AWS CloudShell joins the ranks of hostless shells for operating in your cloud environment. Cloud shells are a huge help to training and enablement...
This article is the third and final of a series. Part 1 justified that human-performed DevOps checklists are essentially source code, and according to...
There are always those who feel checklists are an unnecessary waste of time because they think they can always remember the basics of the steps...
It is easy to think of code as only a computer thing, but in truth, humans have been codifying all kinds of knowledge for centuries. There is one type...