All Posts

A thumbnail image

The Twenty-Year War on Cybercrime

Digital crime is on the rise. To defeat it, defenders need to scale up, gain the full picture of risk, and heed the lessons of John Boyd.

A thumbnail image

The DevOps Security Handbook: Building Security In With Chef, Part III

Image copyright 2016 by Kharnagy, licensed under the Creative Commons Attribution-Share Alike 4.0 International license. Introduction This is the third in a series of occasional posts about security and DevOps.

A thumbnail image

The DevOps Security Handbook: Building Security In With Chef, Part II

Image copyright 2016 by Kharnagy, licensed under the Creative Commons Attribution-Share Alike 4.0 International license. Introduction This is the second in a series of occasional posts about security and DevOps.

A thumbnail image

The DevOps Security Handbook: Building Security In With Chef, Part I

Image copyright 2016 by Kharnagy, licensed under the Creative Commons Attribution-Share Alike 4.0 International license. Introduction This is the first in a series of posts about Chef, an infrastructure automation platform.

A thumbnail image

Building Security In Using Chef

Image copyright 2016 by Kharnagy, licensed under the Creative Commons Attribution-Share Alike 4.0 International license. Lately I have been spending a lot of time with a new best friend.

A thumbnail image

New Web Adventures with Heroku

Image copyright 2016 by Kharnagy, licensed under the Creative Commons Attribution-Share Alike 4.0 International license. Many ardent followers of this blog know that among other things, one of my professional hobbies is application development.