Jed Lehmann (author) - Page 1
Related posts
OWASP Top Ten: 20 years of Application Security
Twenty years of OWASP Top 10 data reveals an uncomfortable truth: we're not fixing the fundamentals. From SQL injection to prompt injection, broken access control to supply chain attacks—same vulnerabilities, different syntax. Practical security advice for developers and leaders.
It works on my cluster: a tale of two troubleshooters
Kubernetes is hard to troubleshoot. Learn how two teams worked together to troubleshoot a particularly tricky bug.
Platform Engineering at scale: Lessons from the conference circuit
In our latest episode of CD Office Hours, Bob Walker and Steve Fenton shared some of the topics that came up at GitHub Universe, KubeCon, and the DevOps London meetup.


