DevOps isn’t magic, but it can look like it from the outside. In today’s job market, workers in...
Author - Stephen Watts
An Introduction to Security Debt
A subset of technical debt, security debt is essentially the vulnerabilities and flaws in your...
Security Automation for 2020 and Beyond
Security automation refers to machine-actions that monitor, detect, troubleshoot and remediate...
Runbook Automation (RBA): An Introduction
IT systems are inherently complex beasts thanks to the very nature of modern technology which is a...
Workload Automation (WLA) vs Robotic Process Automation (RPA):...
Workload automation (WLA) and robotic process automation (RPA) are both tools that help businesses...
What is Security As Code?
Businesses have quickly and sophisticatedly embraced cloud technology to super-serve customers and...
A Primer on Service Level Indicator (SLI) Metrics
Keeping track of customer satisfaction is crucial for any company aiming to provide exceptional...
AWS Sagemaker vs Amazon Machine Learning
As Amazon Web Services (AWS) continues releasing a multitude of products and resources, finding the...
ACID: Atomic, Consistent, Isolated, & Durable
I don’t think it’s an overstatement to say that data is pretty important. Data is especially...
What is Not Invented Here Syndrome?
Pride is a double-edged sword. The good side of pride gives us confidence in our own abilities and...