A Deep Dive into Serverless Attacks, SLS-2: Broken Authentication

Thanks for joining me for the second post in the series. In the previous post I discussed what […]
The post A Deep Dive into Serverless Attacks, SLS-2: Broken Authentication appeared first on Protego.
The post A Deep Dive into Serverless Attacks,… Continue reading A Deep Dive into Serverless Attacks, SLS-2: Broken Authentication

Is AWS Lambda the Most Secure Application Platform? Probably.

We talk a lot about the need for a different security paradigm for serverless, and it’s easy for […]
The post Is AWS Lambda the Most Secure Application Platform? Probably. appeared first on Protego.
The post Is AWS Lambda the Most Secure Ap… Continue reading Is AWS Lambda the Most Secure Application Platform? Probably.

The Serverless Show: Serverless + Blockchain, The Comprehension Divide, Role of DevOps

For this Serverless Podcast, Hillel was joined by Shali Mor, Vice President, R&D and Co-founder of Protego. Watch […]
The post The Serverless Show: Serverless + Blockchain, The Comprehension Divide, Role of DevOps appeared first on Protego.
T… Continue reading The Serverless Show: Serverless + Blockchain, The Comprehension Divide, Role of DevOps

6 Things You’re Probably Doing Wrong Securing Serverless Apps

Do you ever have that sinking feeling in the pit of your stomach, worrying that you’ve forgotten something? […]
The post 6 Things You’re Probably Doing Wrong Securing Serverless Apps appeared first on Protego.
The post 6 Things You’re… Continue reading 6 Things You’re Probably Doing Wrong Securing Serverless Apps

Serverless: Three Revolutions Wrapped in One Buzzword

Serverless is actually 3 different revolutions with 3 different core values: infrastructure, architecture, & operations.
The post Serverless: Three Revolutions Wrapped in One Buzzword appeared first on Protego.
The post Serverless: Three Revolution… Continue reading Serverless: Three Revolutions Wrapped in One Buzzword