Digital crime is on the rise. To defeat it, defenders need to scale up, gain the full picture of risk, and heed the lessons of John Boyd.
Perspective
Posts ∙ 59 posts
Posts
This third post in a series about security and DevOps describes how to configure web servers with TLS.
This second post in a series about security and DevOps describes how to build hardened server images with Chef.
This first post in a series about security and DevOps describes how to bootstrap development of a virtual test server.
Image copyright 2016 by Kharnagy, licensed under the Creative Commons Attribution-Share Alike 4.0 International license. Lately I have been spending a lot of time with a new best friend.
Image copyright 2016 by Kharnagy, licensed under the Creative Commons Attribution-Share Alike 4.0 International license. Many ardent followers of this blog know that among other things, one of my professional hobbies is application development.