Hacker Newsnew | past | comments | ask | show | jobs | submit | fromlogin
Cedar Go Implementation: Simplifying Security for Developers (strongdm.com)
3 points by seanlane on March 12, 2024 | past
Alternatives to HashiCorp Boundary (strongdm.com)
1 point by carride on March 1, 2023 | past
How to Thrive as a Woman in IT: A Comprehensive Guide for 2022 (strongdm.com)
2 points by thenoblesquid on July 29, 2022 | past | 2 comments
How we work: Back end Engineering (strongdm.com)
1 point by et1337 on Nov 1, 2021 | past
StrongDM Raises Series B (strongdm.com)
5 points by mooreds on Sept 15, 2021 | past
Senior Engineering Director at Zymergen on Code Reviews (strongdm.com)
7 points by chef_goldbum on April 19, 2019 | past
Director of IT and Operations at Chef on what it means to be secure [audio] (strongdm.com)
8 points by chef_goldbum on April 12, 2019 | past | 1 comment
Head of security intelligence at Namely on the human aspect of security (strongdm.com)
6 points by chef_goldbum on April 5, 2019 | past
CISO at FactSet on Phishing (strongdm.com)
8 points by chef_goldbum on March 29, 2019 | past
VP of InfoSec at InVision on secure code development [audio] (strongdm.com)
39 points by chef_goldbum on March 22, 2019 | past | 19 comments
How to write a SDLC policy from scratch (strongdm.com)
4 points by chef_goldbum on March 19, 2019 | past
NYC Cyber Command talks threat management, Secure NYC initiative, and data (strongdm.com)
3 points by chef_goldbum on March 15, 2019 | past
Four considerations when writing your system changes policy from scratch (strongdm.com)
5 points by chef_goldbum on March 12, 2019 | past
Head of Core Infrastructure at BuzzFeed talks incident response [audio] (strongdm.com)
7 points by chef_goldbum on March 8, 2019 | past
Troy Hunt on the Token Security podcast talking passwords (strongdm.com)
4 points by _jellyfish on Nov 27, 2018 | past
Token Security: Blend talks rapid deployment in secure environments [podcast] (strongdm.com)
8 points by _jellyfish on Nov 12, 2018 | past
Show HN: StrongDM – 1-click access to any database or server in any environment (strongdm.com)
38 points by sbrown12 on Oct 11, 2018 | past | 6 comments
Comply – Everything You Need to Complete SOC2 – Open Source (strongdm.com)
1 point by tortilla on May 21, 2018 | past
Am I about to be hacked: calculate your risk in 8 questions (strongdm.com)
20 points by sbrown12 on March 6, 2017 | past

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: