-
Recent Posts
Top Posts & Pages
- About
- Contact
- A Deep Dive into DynamoDB Partitions
- Filling the BigQuery paddling pool from the Kinesis Hosepipe
- The most important thing when picking HTTP status codes
- Orchestrating Tasks Using AWS SWF
- The Emergence of The 3 Towers: DevSecOps
- Shine hosts a successful Digital Leaders Breakfast
- Creating a serverless ETL nirvana using Google BigQuery
- Pablo rocking the stage at Google's annual cloud event!
Tags
- 5G
- A/B testing
- accessibility
- accessors
- Adobe
- Adobe Experience Manager
- AEM
- Agile
- Amazon
- amazon cognito
- angular
- angularjs
- appstore
- Architecture
- aria
- asynchronous
- Asynchronous Programming
- Awards
- aws
- Babel
- Backbone
- backbone.js
- backbonejs
- battlehack
- bem
- Best Practices
- Big Data
- BigQuery
- bluetooth
- BQ
- braintree
- Broadband
- Chart.js
- CI
- citcon-anz-2010
- Cloud
- Cloud Dataflow
- Cluster Computing
- Clustering
- CMS
- co
- code
- codedojo
- Commenting
- community
- comparison
- concordion
- Conference
- continuous delivery
- CoreLocation
- couchdb
- couchtato
- cq5
- css
- cucumber
- customer experience
- CX
- Database
- Databases
- delegate
- Design
- devops
- DevOpsSec
- DI
- dirty checking
- Distruptive
- Documentation
- DynamoDB
- dzone
- ec2
- emberjs
- empathy
- Enterprise
- es6
- ES2015
- ETL
- fiber
- firebase
- fitbit
- fullcalendar
- GCP
- generators
- gigabit
- Git
- Gitflow
- Google BigQuery
- Google Cloud
- google cloud dataflow
- Google Cloud Datastore
- Google Cloud Platform
- Google Cloud Storage
- Google Developer Expert
- Google Maps
- Google Pub/Sub
- GPS
- grunt-clientlibify
- gruntjs
- hackathon
- hacking
- Hadoop
- hardware
- html5
- HTTP
- hudson
- human-centered design research
- IaaS
- identity map
- idm
- in-app
- Innovation Session
- Internet
- Internet of Things
- iOS
- iPhone
- itunes
- jackson
- Java
- JavaOne
- javascript
- JavaServer Pages
- jenkins
- jhipster
- jmeter
- jquery
- jsconfau
- jslint
- json
- JSP
- key value observer
- kids coding
- kinesis
- koa
- lambdas
- lessons
- Location Data
- Loon
- MapReduce
- Mass Insertion
- melbjs
- meteor
- MFA
- microservices
- Mobile
- Model–view–controller
- monitoring
- Multi -Factor-Authentication
- netbiscuits
- NewRelic
- News
- ngaria
- node
- node.js
- node.js
- NoSQL
- notification
- oam
- Objective-C
- OpenCms
- Open source
- oracle access manager
- osdc2103
- pair-programming
- participatory design
- partitions
- patterns
- payments
- paypal
- Performance
- PHP
- phpunit
- Pipelining
- Play
- Play Framework
- preferred vendors
- Programming
- Projections
- Promises
- Provisioned IOPS
- purchasing
- Python
- qualitative
- R
- Rails
- rds
- re: Invent
- React
- ReactiveCocoa
- React Native
- Redis
- Redshift
- release management
- Replication
- REST
- RESTful
- Risk Management
- Ruby
- s3
- Scala
- SDK
- Security
- Sensis
- service design
- Silex
- Simple Workflow
- Simulate
- single page app
- single page apps
- sinon.js
- site monitoring
- Software Development
- Software Engineering
- spa
- Spark
- Speed
- spring
- Spring Data
- Spring Data REST
- Spring Framework
- Spring Security
- SQL
- Streaming
- streams
- styleguide
- SWF
- swift
- swipeconference
- tech
- Telstra
- testflightapp
- testing
- TLS/SSL
- Tomcat
- Touch ID
- tutorial
- UDF
- UI
- Unit Testing
- usability
- user defined functions
- ux
- wds2013
- web
- web directions
- Web Directions Code
- XCode
- YARN
- YouTube
- YOW!
Meta
Tag Archives: Security
The Emergence of The 3 Towers: DevSecOps
I had the opportunity to attend AWS bootcamp in Sydney a couple of weeks ago. The session I chose to attend was entitled “Securing Cloud Workloads with DevOps Automation”. There were many interesting concepts discussed, all hinging around the new term ‘DevSecOps’. … Continue reading
Posted in Continuous Delivery, Continuous Integration, DevOps
Tagged Agile, aws, DevOpsSec, Security
1 Comment
Biometric authentication with Touch ID
Passwords have become such a pain in the neck. Switching between different apps and websites you will usually find different password security policies. One site will inform you no more than 10 characters, other a 6 digits pin. While some other sites will … Continue reading
Tagged iOS, iPhone, Security, Touch ID
Leave a comment
Securing your Spring App using 2FA
Not so long ago, a good old username and password were considered more than enough to secure access to our applications and favourite web sites. But back then, nobody could have imagined the countless ways in which a hacker can now get a hold of our precious … Continue reading