Baltimore, MD, USA
Apr 22, 2019 | By Trisha Paine
Whether you align with the North or the South, you have one common enemy, the Night King. The Night King is fierce and powerful. He delays production, he is able to penetrate your walls; traditional defense mechanisms will not stop him and his army. You need Dragonglass.
Apr 4, 2019 | By Trisha Paine
It’s a new season, everyone is full of hope and optimism that this will be their year- that they will end the playoff season as the World Champions. Yes, this is the goal for any team in Major League Baseball as the first pitch is thrown across home plate on Opening Day, but the same holds true for any project undergone by an organization.
Mar 8, 2019 | By Tal Melamed
Let me first apologize for the long absence. However, I haven’t been idle. I’ve been working hard to take the OWASP Serverless Top 10 project to its next stages: an open-call to collect as much data as possible, then the final publishing of a serverless-designated top 10 report that will serve as the go-to for every serverless security practitioner and developer. Stay tuned.
Feb 21, 2019 | By Tal Melamed
Cloud-native applications are applications that have been built purposely to be deployed and operated in a cloud environment. They consist of small, independent microservices, such as serverless functions, and utilize services that cloud providers and third-party partners provide via API, all while leveraging the cloud for automated stability, scaling, and recovery.
Feb 5, 2019 | By Hillel Solow
Serverless enables you to shift even more infrastructure management responsibilities to your cloud provider. Serverless architectures provide you the benefit of automated, nearly infinite scaling. Very little stands between developers and deployed code, which speeds time to market and makes it easier to maintain and test individual functions. No infrastructure is involved, and you get it out of the box. Finally, you pay only for what you use, resulting in lower costs.
Jan 1, 2019 | By Protego Labs
There are benefits to serverless architectures which make them inherently more secure. However, there are also new risks that need to be mitigated.
Jan 18, 2019 | By Protego Labs
For this episode of The Serverless Show, Tal was in the office with Hillel in Jerusalem, and they were joined by Slobodan Stojanovic, CTO of Cloud Horizon, and an official AWS Serverless Community Hero, via Zoom from Belgrade, Serbia.
Dec 20, 2018 | By Protego Labs
In the latest edition of "A deep dive into the Serverless Attacks" The OWASP Serverless Top 10, Protego’s Head of Security Research demonstrates the potential results of a failure to protect Sensitive Data.
Dec 6, 2018 | By Protego Labs
The latest Serverless Show is a re:Invent recap featuring Forrest Brazeal, a senior cloud architect at Trek10 and an official AWS Serverless Community Hero.
Nov 1, 2018 | By Protego Labs
Serverless architectures have multiple potential entry points, services, events and triggers, with no continuous flow. Developers must make sure every resource requires authentication. In this continuation of our series on The OWASP Serverless Top 10, Protego’s Head of Security Research demonstrates the potential results of failure to do so.