Remove tags dagger
article thumbnail

Technology Short Take 165

Scott Lowe

Cloud Computing/Cloud Management Dinesh Sharma has an interesting post showing to combine two IaC tools—CloudFormation StackSet and Pulumi—to help ensure tagging compliance. I didn’t really understand Dagger until I read this.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

And it was all cloak and daggers for me at that time. Anyone want to tag along? I don't know what kind of target they poked at, but that for me was mind blowing. Wow, super cool hackers that get to break into stuff. I want to do that. I had no idea. I want to do that. Vamosi: So how do you get to Carnegie Hall?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

And it was all cloak and daggers for me at that time. Anyone want to tag along? I don't know what kind of target they poked at, but that for me was mind blowing. Wow, super cool hackers that get to break into stuff. I want to do that. I had no idea. I want to do that. Vamosi: So how do you get to Carnegie Hall?

article thumbnail

The Hacker Mind Podcast: Bug Bounty Hunters

ForAllSecure

And it was all cloak and daggers for me at that time. Anyone want to tag along? I don't know what kind of target they poked at, but that for me was mind blowing. Wow, super cool hackers that get to break into stuff. I want to do that. I had no idea. I want to do that. Vamosi: So how do you get to Carnegie Hall?