| | C++ in the Linux Kernel (threatstack.com) |
| 112 points by davikrr on Dec 7, 2021 | past | 97 comments |
|
| | An Open Letter to Security Vendors’ Predatory Use of Public Breaches (threatstack.com) |
| 2 points by neom on Dec 11, 2020 | past |
|
| | How Threat Stack Does DevOps (Part IV): Making Engineers Accountable (threatstack.com) |
| 2 points by kiyanwang on March 25, 2018 | past |
|
| | Incorporating AWS Security Best Practices into Terraform Design (threatstack.com) |
| 2 points by kiyanwang on March 27, 2017 | past |
|
| | Incorporating AWS security practices into your Terraform code (threatstack.com) |
| 2 points by tmclaugh on March 21, 2017 | past |
|
| | Cloud Security Best Practices: Finding, Securing, and Managing Secrets, Part 1 (threatstack.com) |
| 2 points by kiyanwang on March 12, 2017 | past |
|
| | Aptly for Debian/Ubuntu APT repo management (threatstack.com) |
| 1 point by tmclaugh on March 1, 2017 | past |
|
| | Using Chef Habitat to package your web service (threatstack.com) |
| 1 point by tmclaugh on Feb 24, 2017 | past |
|
| | Cloud Security Best Practices: Finding, Securing, and Managing Secrets (threatstack.com) |
| 3 points by remx on Feb 22, 2017 | past |
|
| | How to Use Automation to Improve Your Cloud Security Posture (threatstack.com) |
| 2 points by kungfudoi on Jan 27, 2017 | past |
|
| | Parsing Simple Grammars in Scala with Parboiled2 (threatstack.com) |
| 1 point by tmclaugh on Jan 25, 2017 | past |
|
| | 5 Things Security Can Learn from Operations' Transition into DevOps (threatstack.com) |
| 3 points by tmclaugh on Dec 9, 2016 | past | 1 comment |
|
| | Interactive guide and map of Boston for those going to USENIX LISA next week (threatstack.com) |
| 2 points by tmclaugh on Dec 2, 2016 | past |
|
| | Dev, Ops, and the Role of Security (threatstack.com) |
| 2 points by kiyanwang on Sept 19, 2016 | past |
|
| | Useful Scalac Options for Better Scala Development: Part 1 (threatstack.com) |
| 1 point by pedrorijo91 on Aug 9, 2016 | past | 1 comment |
|
| | Scala at Scale: Leaving Unhandled Errors Behind (threatstack.com) |
| 1 point by haggy on July 5, 2016 | past | 1 comment |
|
| | It All Started with a Wager About System Upgrades (threatstack.com) |
| 1 point by kiyanwang on March 30, 2016 | past |
|
| | Who Watches the Watchmen? Securing Configuration Management Systems (threatstack.com) |
| 1 point by jenandre on Feb 25, 2015 | past |
|
| | The Linux “Grinch” Vulnerability: Separating Fact from FUD (threatstack.com) |
| 2 points by jenandre on Dec 18, 2014 | past |
|
| | A Tale of Nagios and the Bash Vulnerability (threatstack.com) |
| 5 points by jenandre on Sept 25, 2014 | past |
|
| | How DevOps and Models Enhance Behavioral Detection (threatstack.com) |
| 2 points by abotsis on July 30, 2014 | past |
|
| | Why SecDevOps Will Save the Cloud (threatstack.com) |
| 3 points by billyoung on July 9, 2014 | past |
|