Links
AddIn mid-May 2025, blocked the largest DDoS attack ever recorded: a staggering 7.3 terabits per second (Tbps).
There's a million ways to connect to your home lab, but some options are better for your needs.
The traditional wisdom says resting meat keeps it juicy. But when we put that idea to the test, we found a different reason to rest—one that has nothing to do with juice.
Rclone syncs your files to cloud storage: Google Drive, S3, Swift, Dropbox, Google Cloud Storage, Azure, Box and many more.
These nine open source MCP projects provide new frameworks, tools, and assistants to unlock AI-native workflows, agentic tooling, and innovation.
CISA says the U.S. government has extended MITRE's funding to ensure no continuity issues with the critical Common Vulnerabilities and Exposures (CVE) program.
For those who code
Git 2.46 is here with new features like pseudo-merge bitmaps, more capable credential helpers, and a new git config command. Check out our coverage on some of the highlights here.
As a security best practice, AWS Identity and Access Management (IAM) recommends that you use temporary security credentials from AWS Security Token Service (STS) when you access your AWS resources. Temporary credentials are short-term credentials generated dynamically and provided to the user upon request. Today, one of the most widely used mechanisms for requesting temporary […]
Jason Chen and the Time Banana eBook : Richardson, Duncan: Amazon.com.au: Kindle Store
The Louvre heist was an instant joke online — a joke that gets even funnier when you learn the museum's video surveillance password.
A wise colleague once told me I should never have anything on in the background just to have it on. He’s probably right, but I still like to pop on a show
Thematic links across books, automatically discovered by Claude.
July 24, 2020: The number 9 item in this list, the Auditing Security Checklist, has been replaced by a Cloud Audit Academy course. The following list includes the ten most downloaded AWS security and compliance documents in 2017. Using this list, you can learn about what other AWS customers found most interesting about security and […]
Sticking to container security best practices is critical for successfully delivering secure software.
Despite Kubernetes' own declarative API, and the obvious benefits of maintaining a cluster's infrastructure and services from the same infrastructure as code repository, Terraform is far from the first choice to provision Kubernetes resources. Kubestack, the open-source Terraform framework I maintain, aims to provide the best developer experience for teams working with Terraform and Kubernetes.
Introduction: when the trust model can’t be trusted Secrets vaults are the backbone of digital infrastructure. They store the credentials, tokens, and certificates that govern access to systems, services, APIs, and data. They’re not just a part of the trust model, they are the trust model. In other words, if your vault is compromised, your […]
Sly Stone, the pioneering leader of the funk band bearing his name, Sly and the Family Stone, has died, according to his family. Stone was 82 years old.