Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
C++ in the Linux Kernel (threatstack.com)
112 points by davikrr on Dec 7, 2021 | past | 97 comments
An Open Letter to Security Vendors’ Predatory Use of Public Breaches (threatstack.com)
2 points by neom on Dec 11, 2020 | past
How Threat Stack Does DevOps (Part IV): Making Engineers Accountable (threatstack.com)
2 points by kiyanwang on March 25, 2018 | past
Incorporating AWS Security Best Practices into Terraform Design (threatstack.com)
2 points by kiyanwang on March 27, 2017 | past
Incorporating AWS security practices into your Terraform code (threatstack.com)
2 points by tmclaugh on March 21, 2017 | past
Cloud Security Best Practices: Finding, Securing, and Managing Secrets, Part 1 (threatstack.com)
2 points by kiyanwang on March 12, 2017 | past
Aptly for Debian/Ubuntu APT repo management (threatstack.com)
1 point by tmclaugh on March 1, 2017 | past
Using Chef Habitat to package your web service (threatstack.com)
1 point by tmclaugh on Feb 24, 2017 | past
Cloud Security Best Practices: Finding, Securing, and Managing Secrets (threatstack.com)
3 points by remx on Feb 22, 2017 | past
How to Use Automation to Improve Your Cloud Security Posture (threatstack.com)
2 points by kungfudoi on Jan 27, 2017 | past
Parsing Simple Grammars in Scala with Parboiled2 (threatstack.com)
1 point by tmclaugh on Jan 25, 2017 | past
5 Things Security Can Learn from Operations' Transition into DevOps (threatstack.com)
3 points by tmclaugh on Dec 9, 2016 | past | 1 comment
Interactive guide and map of Boston for those going to USENIX LISA next week (threatstack.com)
2 points by tmclaugh on Dec 2, 2016 | past
Dev, Ops, and the Role of Security (threatstack.com)
2 points by kiyanwang on Sept 19, 2016 | past
Useful Scalac Options for Better Scala Development: Part 1 (threatstack.com)
1 point by pedrorijo91 on Aug 9, 2016 | past | 1 comment
Scala at Scale: Leaving Unhandled Errors Behind (threatstack.com)
1 point by haggy on July 5, 2016 | past | 1 comment
It All Started with a Wager About System Upgrades (threatstack.com)
1 point by kiyanwang on March 30, 2016 | past
Who Watches the Watchmen? Securing Configuration Management Systems (threatstack.com)
1 point by jenandre on Feb 25, 2015 | past
The Linux “Grinch” Vulnerability: Separating Fact from FUD (threatstack.com)
2 points by jenandre on Dec 18, 2014 | past
A Tale of Nagios and the Bash Vulnerability (threatstack.com)
5 points by jenandre on Sept 25, 2014 | past
How DevOps and Models Enhance Behavioral Detection (threatstack.com)
2 points by abotsis on July 30, 2014 | past
Why SecDevOps Will Save the Cloud (threatstack.com)
3 points by billyoung on July 9, 2014 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: