Supply Chain Attack as Code

The other day I was thinking about supply chain attacks and how that applies to infrastructure as code. I decided to build a little proof of concept of a possible attack and I’ll try to run you through it.

Read More

Ideal monitor rotation for programmers

It all started with this toot from Aurynn. do I just need to put one screen in portrait mode? In the past I had experimented with using portrait displays for reading and programming.

Read More

Build Pipeline Security

This occurred on an AWS website (not a site hosted on AWS, but a site run by AWS). It shows that security is hard, even for a $51 billion business. This issue can occur not just on websites but even SDKs and libraries

Read More