An introduction to Generative AIImagine a super smart robot that has a special power: it can create amazing things! It can write stories, draw pictures, and even make up…23h ago23h ago
An overview of threat modeling: Securing your applications proactivelyIn today’s rapidly evolving digital landscape, security is still being seen as a cost center for many companies, since securing products…May 22May 22
This is what you need to know if you want to become a Security Software EngineerIntroductionAug 30, 2022Aug 30, 2022
Vault secrets as environment variablesIf you are a DevSecOps engineer working with Vault to provide a secure way to handle secrets and you are reading this post, then there are…Jul 1, 20222Jul 1, 20222
A software troubleshooting guide — Tips & TricksI’ve been a software engineer for more than 4 years now, on the last job I had, I was doing a kinda “software escalation engineer role” in…Mar 22, 2022Mar 22, 2022
Public key infraestructure — PKIThe Public key infrastructure (PKI) is a framework (guideline) that consists of several security policies, communication protocols, and…Mar 13, 20221Mar 13, 20221
An overview of Threat Intelligence in CybersecuritySecurity is growing faster than ever, and some concepts need to be a must-know in order to be able to understand the security posture of…Mar 8, 20222Mar 8, 20222