Hacker News .hnnew | past | comments | ask | show | jobs | submit | aracine's submissionslogin
1.Check Out This Fun IT Alert Generator (italertgenerator.com)
1 point by aracine on March 22, 2019 | past
2.Announcing the General Availability of MongoDB 3.4 and Bug Hunt Winners (mongodb.com)
5 points by aracine on Nov 29, 2016 | past
3.Announcing MongoDB 3.4 (mongodb.com)
6 points by aracine on Nov 1, 2016 | past | 1 comment
4.8 Books Every Security Architect Must Read (conjur.net)
1 point by aracine on Feb 25, 2016 | past
5.Security, Agility, and Accountability: A Balancing Act (conjur.net)
1 point by aracine on Feb 24, 2016 | past
6.6 Blogs Every Security Architect Should Be Reading (conjur.net)
1 point by aracine on Feb 19, 2016 | past
7.[QUIZ] Take the Automated Infrastructure Risk Assessment (typeform.com)
1 point by aracine on Feb 16, 2016 | past
8.How to get developers on board with security (conjur.net)
1 point by aracine on Feb 16, 2016 | past
9.Conjur Accelerates Adoption of Automated Infrastructure with New Software Release (conjur.net)
2 points by aracine on Jan 28, 2016 | past
10.Gartner: Cloud Breaches Are Almost Certainly the Customer’s Fault (conjur.net)
2 points by aracine on Jan 28, 2016 | past
11.Top 5 Challenges Financial Services Faces in Moving to the Cloud (conjur.net)
1 point by aracine on Jan 12, 2016 | past
12.Looking Ahead: The 2016 Data Breach Forecast (conjur.net)
2 points by aracine on Dec 22, 2015 | past
13.Puppet and Node-Side Secrets (conjur.net)
2 points by aracine on Dec 17, 2015 | past
14.Continuous Integration Insecurity (conjur.net)
1 point by aracine on Dec 11, 2015 | past
15.The 10 Factor CI Job (10factor.ci)
1 point by aracine on Dec 9, 2015 | past
16.How to Securely Scale Continuous Integration (conjur.net)
1 point by aracine on Dec 9, 2015 | past
17.The Unlucky 13: 2015's Biggest Breaches [graphic] (conjur.net)
1 point by aracine on Dec 8, 2015 | past
18.3 Key Reasons You Should Know Your Service Provider (conjur.net)
1 point by aracine on Nov 16, 2015 | past
19.The Big Shift: Static to Dynamic Security Models (conjur.net)
1 point by aracine on Oct 8, 2015 | past
20.Hackers.Checking In (conjur.net)
1 point by aracine on Sept 30, 2015 | past
21.All of Your Robots Belong to Us (conjur.net)
1 point by aracine on Sept 8, 2015 | past
22.DevOps and Security: The Five Monkeys (conjur.net)
4 points by aracine on Aug 31, 2015 | past
23.Software Defined Firewall: Scaling Enterprise DevOps Security (conjur.net)
3 points by aracine on Aug 13, 2015 | past
24.Scaling Enterprise DevOps Security with Machine Identity – SSH (conjur.net)
1 point by aracine on Aug 11, 2015 | past
25.Scaling Enterprise DevOps Security with Machine Identity (conjur.net)
1 point by aracine on Aug 6, 2015 | past
26.Conjur and Jenkins, Revisited (conjur.net)
4 points by aracine on July 31, 2015 | past
27.How Securing WebQuake Is Like Securing an Enterprise Application (conjur.net)
2 points by aracine on July 20, 2015 | past
28.Delivering Conjur with Vagrant (conjur.net)
2 points by aracine on July 16, 2015 | past
29.Why Continuous Integration and Continuous Delivery Are Not the Same (conjur.net)
1 point by aracine on July 8, 2015 | past
30.Improve Your Docker Workflow with Summon (conjur.net)
4 points by aracine on July 6, 2015 | past

Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: