Cybersecurity | Cloud | DevelopmentAutomate your IX’s RS Config November 16, 2024 video 2019alertingArchitectureautomatebountybugcertificateclouddefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeylogmanagementmanagermonitoringOLAPOLTPOnionOpenopenscapOSINTpolarDBprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemTorVitessWireshark
Cybersecurity | Cloud | DevelopmentDoD OCIO Cybersecurity Awareness Month Message November 27, 2022 video defenseDOD;military
Cybersecurity | Cloud | DevelopmentBSidesSLC 2017 — Andrew Hall — NIST Risk Management Framework and why it should be utilized November 13, 2022 video Andrew Hallblue teamBSidesBSidesSLCdefenseFrameworkhackingNISTnist 800-53Rushan
Cybersecurity | Cloud | DevelopmentUsing Pod Security Policies to harden your Kubernetes cluster December 16, 2020 video 2019alertingArchitectureautomatebountybugcertificatecloudclusterdefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeykuberneteslogmaliciousmanagementmanagermonitoringmultinetworkOLAPOLTPOnionOpenopenscapOSINTpodpolarDBPolicyprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemtenantTortrafficusabilityUserVitessWireshark
Cybersecurity | Cloud | DevelopmentScale MySQL beyond limits with ProxySQL November 22, 2020 video 2019alertingArchitectureautomatebountybugcertificateclouddefenseDevopsDevSecOpsDistributedElixirencryptionengineeringfeedbackfunctionalhasgeekKafkakeylogmanagementmanagermonitoringOLAPOLTPOnionOpenopenscapOSINTpolarDBprogrammingpythonreliabilityremoterootconfroutingSecurityServersourceSRESSHstreamsSystemTorVitessWireshark