For the best experience on desktop, install the
Chrome extension
to track your reading on news.ycombinator.com
×
Hacker News
new
|
past
|
comments
|
ask
|
show
|
jobs
|
submit
|
history
|
from
register
C++ in the Linux Kernel
(
threatstack.com
)
112 points
by
davikrr
on Dec 7, 2021
|
past
|
97 comments
An Open Letter to Security Vendors’ Predatory Use of Public Breaches
(
threatstack.com
)
2 points
by
neom
on Dec 11, 2020
|
past
How Threat Stack Does DevOps (Part IV): Making Engineers Accountable
(
threatstack.com
)
2 points
by
kiyanwang
on March 25, 2018
|
past
Incorporating AWS Security Best Practices into Terraform Design
(
threatstack.com
)
2 points
by
kiyanwang
on March 27, 2017
|
past
Incorporating AWS security practices into your Terraform code
(
threatstack.com
)
2 points
by
tmclaugh
on March 21, 2017
|
past
Cloud Security Best Practices: Finding, Securing, and Managing Secrets, Part 1
(
threatstack.com
)
2 points
by
kiyanwang
on March 12, 2017
|
past
Aptly for Debian/Ubuntu APT repo management
(
threatstack.com
)
1 point
by
tmclaugh
on March 1, 2017
|
past
Using Chef Habitat to package your web service
(
threatstack.com
)
1 point
by
tmclaugh
on Feb 24, 2017
|
past
Cloud Security Best Practices: Finding, Securing, and Managing Secrets
(
threatstack.com
)
3 points
by
remx
on Feb 22, 2017
|
past
How to Use Automation to Improve Your Cloud Security Posture
(
threatstack.com
)
2 points
by
kungfudoi
on Jan 27, 2017
|
past
Parsing Simple Grammars in Scala with Parboiled2
(
threatstack.com
)
1 point
by
tmclaugh
on Jan 25, 2017
|
past
5 Things Security Can Learn from Operations' Transition into DevOps
(
threatstack.com
)
3 points
by
tmclaugh
on Dec 9, 2016
|
past
|
1 comment
Interactive guide and map of Boston for those going to USENIX LISA next week
(
threatstack.com
)
2 points
by
tmclaugh
on Dec 2, 2016
|
past
Dev, Ops, and the Role of Security
(
threatstack.com
)
2 points
by
kiyanwang
on Sept 19, 2016
|
past
Useful Scalac Options for Better Scala Development: Part 1
(
threatstack.com
)
1 point
by
pedrorijo91
on Aug 9, 2016
|
past
|
1 comment
Scala at Scale: Leaving Unhandled Errors Behind
(
threatstack.com
)
1 point
by
haggy
on July 5, 2016
|
past
|
1 comment
It All Started with a Wager About System Upgrades
(
threatstack.com
)
1 point
by
kiyanwang
on March 30, 2016
|
past
Who Watches the Watchmen? Securing Configuration Management Systems
(
threatstack.com
)
1 point
by
jenandre
on Feb 25, 2015
|
past
The Linux “Grinch” Vulnerability: Separating Fact from FUD
(
threatstack.com
)
2 points
by
jenandre
on Dec 18, 2014
|
past
A Tale of Nagios and the Bash Vulnerability
(
threatstack.com
)
5 points
by
jenandre
on Sept 25, 2014
|
past
How DevOps and Models Enhance Behavioral Detection
(
threatstack.com
)
2 points
by
abotsis
on July 30, 2014
|
past
Why SecDevOps Will Save the Cloud
(
threatstack.com
)
3 points
by
billyoung
on July 9, 2014
|
past
Guidelines
|
FAQ
|
Lists
|
API
|
Security
|
Legal
|
Apply to YC
|
Contact
Search:
×
HN For You
Display Mode
Highlight
Top
Only
Debug mode
Sign Out
API Key:
Connect
Create an account
to get your API key.