Articles by David Galaiata

Six Advantages of Cloud Computing + Real World Examples

Six Advantages of Cloud Computing + Real World Examples

Looking at the AWS six advantages of cloud computing and providing real-world examples.

6 min read
How to create multiple TXT records in AWS Route 53

How to create multiple TXT records in AWS Route 53

Quickly create multiple TXT records in AWS Route 53.

1 min read
How I Passed the GitHub Foundations Exam

How I Passed the GitHub Foundations Exam

Explore the strategies I used to successfully pass the GitHub Foundations Exam and validate my GitHub skills.

3 min read
Reflection on Goals and Accomplishments

Reflection on Goals and Accomplishments

Reflecting on goals and accomplishments as I look ahead to the rest of 2023 and plan for future success.

3 min read
Tips to Become a Senior Engineer in IT Consulting

Tips to Become a Senior Engineer in IT Consulting

Practical tips to become a senior engineer and advance your career in IT consulting.

3 min read
A New Approach to SaaS Security

A New Approach to SaaS Security

Taking a look at a new approach to securing SaaS applications with complete visibility and control.

2 min read
Understanding the OWASP Top 10

Understanding the OWASP Top 10

Understanding the OWASP key web application security risks and how to mitigate them.

4 min read
Responding to Events in the Cloud

Responding to Events in the Cloud

A framework for responding to alerts in the cloud and maintaining operational excellence.

8 min read
Access Control Gaps Lead To Data Breaches

Access Control Gaps Lead To Data Breaches

Overly permissive users lead to Salesforce data breach and the importance of SSPM solutions.

2 min read
The Anatomy of SSPM Checks

The Anatomy of SSPM Checks

Exploring the crucial components within SSPM security checks and how they secure SaaS environments.

3 min read
SaaS Termination

SaaS Termination

What to look for when you are ending a SaaS contract to maintain security and compliance.

3 min read
SaaS Vendor Security Checklist

SaaS Vendor Security Checklist

A checklist to assess SaaS vendor security during the due diligence process.

2 min read
Integrating a New System into an Existing Security Boundary

Integrating a New System into an Existing Security Boundary

Ensure a secure and compliant integration when introducing a new system into an existing security boundary.

3 min read
A Cybersecurity Program Framework

A Cybersecurity Program Framework

A reusable starting point for building a cybersecurity program using Assess, Manage, and Validate pillars.

3 min read
The Sprint Demo Challenge

The Sprint Demo Challenge

How engineers can showcase invisible value and make their security work visible during sprint demos.

5 min read
Software Development Life Cycle (SSDLC) in Cloud Security

Software Development Life Cycle (SSDLC) in Cloud Security

Integrating security into every phase of cloud software development with SSDLC best practices.

4 min read
Uninstall the ManageEngine Agent on macOS

Uninstall the ManageEngine Agent on macOS

How to uninstall the ManageEngine agent on macOS when the standard method does not work.

1 min read
I Created a Magic 8 Ball in Python

I Created a Magic 8 Ball in Python

Magic 8 ball app in Python using random selection and user input.

1 min read
iTerm2 w/ Oh My Zsh Quick Config

iTerm2 w/ Oh My Zsh Quick Config

Set up your terminal with this Oh My Zsh quick config guide for iTerm2 on macOS.

1 min read
Pre-commit Hooks vs. Pipeline Security Scans

Pre-commit Hooks vs. Pipeline Security Scans

Understanding the differences between pre-commit hooks and pipeline security scans in DevOps.

4 min read
Mario Python Cheatsheet

Mario Python Cheatsheet

The Python cheatsheet I wish I had when I first started learning Python, featuring Mario Bros examples.

2 min read