Site Overlay

Stride Threat Model and Other Security Tools

Reading Time: 7 minutes Stride Threat Model and other tools and techniques have fired the discussion this week: ‘Threat modelling, as a technique has been awesome, not only for good application design, but also for having conversations with security partners/teams on the threats we have identified and what we’re doing to mitigate them’. DaveContinue readingStride Threat Model and Other Security Tools

Secure cloud architecture – is serverless the answer?

Reading Time: 6 minutes Dave, Mike and Mark talk about secure cloud architecture and how serverless and cloud providers can provide a secure solution and more time for developers to think about and design secure solutions. Dave Anderson   Hi folks! Welcome to the next edition of The Serverless Craic. My name’s Dave Anderson. I’mContinue readingSecure cloud architecture – is serverless the answer?

How to make well-architected work for organisations (2)

Reading Time: 6 minutes This article is the second in a series – part 1 gives a little introduction to well-architected. How the process works Now that we have established the need for well-architected in an organization and the need for a lightweight process to drive improvements, let’s deep dive into how that process,Continue readingHow to make well-architected work for organisations (2)

How to make well-architected work for organisations (1)

Reading Time: 5 minutes Security, Cost, OpEx, Reliability & Performance (SCORP) All three leading Cloud Providers (AWS, Azure, GCP) in recent times have produced well-architected frameworks and guidance for teams and organisations to guide engineering and architecture approaches within their platforms. What is the well-architected framework? AWS Well-Architected helps cloud architects build secure, high-performing,Continue readingHow to make well-architected work for organisations (1)

Translate »