I recently wrote about my experience going from IT to DevOps. If you’re currently in IT and looking to get involved with software development, or just curious about the transition, I advise you to go check it out. After sharing that post, I got a bunch of requests to share how I broke into IT […]
Securing Your Infrastructure With Best Practices From DevSecOps.
How do you secure something you can’t even see, hear, or touch? They say the only secure server is one that isn’t turned on or connected to the internet. While that is true, it isn’t really practical, so we need to figure out ways to avoid exposing our company or clients data to malicious actors. Whether […]
The Dangers of Shadow IT
Shadow IT is a term often used to describe information-technology systems and solutions built and used inside organizations without explicit organizational approval. It is also used, along with the terms “Stealth IT” and “Client IT”, to describe solutions specified and deployed by departments other than the IT department. At one point, Shadow IT was merely […]
Manage Your Passwords with a Tiered System
We need to rethink how we manage our passwords and online assets. We tend to reuse the same username and password across all websites. We’ve seen a rash of databases for social services being dumped all across the dark web and even open internet. Whether it’s Ashley Madison, Adobe, MySpace, or even LinkedIn, major social […]