The goal of this article is to present 3 popular extensibility architectural patterns from a developer's perspective using well-known programming principles.
Explore the world of containers and microservices in K8s-based systems and how they enable the building, deployment, and management of cloud-native applications at scale.
Look at the current state of managed Kubernetes offerings as well as options for self-managed clusters. Discuss the pros and cons as well as recommendations.
Optimizing web performance is critical for response times under three seconds. Front-end resources play a major role, warranting individual optimization before high user loads.
This article explores five benefits of data lineage, shedding light on how it enhances data quality, governance, transparency, troubleshooting, and resource optimization.
A technical analysis of Meltdown, which allows rogue processes to read all memory. This deep dive assumes some familiarity with CPU architecture and OS kernels.
Human error is a leading cause of data breaches, but software developers can help change that. Here are some design tips to make human error less likely.
DEF CON 31 was a unique experience. Read highlights from GitGuardian's time in Las Vegas, AppSec Village, the Hunt the Hacker CTF, insightful talks, and hacker fun.
While coding is beneficial, it's not always necessary. Many cyber security roles require scripting or programming knowledge, but there are also non-technical roles.