Stay Ahead of Scammers: A GPT-4-Powered SMS Bot to Keep You Safe from Phishing Texts 2023-03-31T13:54:40+01:00March 31st, 2023|Innovation, Security, Tech|
How We Improve the Reliability of Cypress Tests 2023-03-30T18:08:06+01:00March 30th, 2023|Performance, Security, Tech|
The OWASP Top Ten Workshop 2022-11-28T17:02:13+00:00November 24th, 2022|Security, Tech, Web App Development|
Secure DevOps: The What, the Why and the How 2022-08-09T10:18:37+01:00August 9th, 2022|Capability Building, DevOps, Security|
How to Avoid Time-Based DDOS Attacks in Node.js 2022-09-29T12:04:01+01:00July 21st, 2022|Node.js, Security, Tech|
Cloud Governance with CDK using Aspects 2022-11-28T10:57:40+00:00March 8th, 2022|Cloud Native, DevOps, Security, Tech|
Optic – Secure Npm Release Automation 2022-09-29T12:05:34+01:00March 3rd, 2022|DevOps, Languages, Tools & Frameworks, Security, Tech|
10 Tips for successful DevOps 2022-11-28T10:45:46+00:00September 16th, 2019|DevOps, Cloud Native, Culture, Security|
5 Guidelines to Boost the Security of Modern Applications 2020-12-30T15:31:33+00:00December 20th, 2018|eBook, Security|
How to integrate security into DevOps 2021-06-08T15:11:53+01:00November 13th, 2018|Webinar, DevOps, Security|
Static Analysis of Docker image vulnerabilities with Clair 2022-09-29T16:11:10+01:00November 13th, 2018|Languages, Tools & Frameworks, Security, Tech|