Serverless Security And The Weakest Link (Or How Not to Get Nuked by App-DoS)

Here's a short blog post on design-for-failure, serverless scalability, App layer DoS and what happens when you rely on open source 3rd party libraries ...

Serverless And The Evolution In Cloud Security, How FaaS Differs From IaaS

Security is a shared responsibility between the cloud provider and the customer. This shared model can help relieve customer’s operational burden as cloud providers operate, manage and control the components from the ...

Musings on Serverless and Application Security With Simon Wardley

While traveling home from ServerlessConf in San Francisco, I bumped into Simon Wardley and we engaged in an hour long discussion on serverless application security. I found the discussion extremely intriguing and ...

A Deep Dive on AWS CloudFormation Custom Resources – Learn How to Implement Serverless Authentication The Custom Way!

Overview On AWS CloudFormation Custom Resources AWS CloudFormation lets you describe most AWS cloud environment resources in a neat and tidy way. Developing a product which is described completely by CloudFormation is ...

Research Reveals That 21% of Open Source Serverless Applications Have Critical Vulnerabilities

Did you know that more than one-in-five serverless applications contains critical security vulnerabilities? ...