DevSecOps Tools and Processes

Goal: Have an automated, auditable secure CI/CD environment where security controls are transparent to developers and users. To this end, I propose the following: Ensure development, QA, and production servers …

My Docker Cheat Sheet

How many times have you been working with multiple containers & there is that one *simple* problem that takes you two days to figure out?  You can go get kubernetes …

Phishing

THE 3 TYPES OF PHISHING EMAILS Stupid but Harmless: Examples of these…  Just today from the INBOX I’ve had since 1991 tango(at)1991.com: Penis Enlargement, Huge Savings…, Meet Local Singles!!, Fatty …

CliqSafe

The most common attack in a cyber-breach (the FBI has estimates this number to be as high as 80%) occurs when an unsuspecting user browses via email to a phishing …