Letha Dunn has been writing about technology for more than thirty years. During the past decade, she’s focused on educating engineers about identity and access management, CI/CD, and project velocity. Letha lives in the Pacific Northwest, where she rescues and rehabilitates abused and neglected horses and dogs.
Blog Post by Letha Dunn
Letha DunnDecember 15, 20229 min read
Agent-Based or Agentless Cloud Security Scanning
Have you ever asked a group of security or operations engineers which is better: ...
Letha DunnNovember 16, 202216 min read
Should Your Infrastructure Security Shift Left or Right?
A darling of conference talks, videos, and articles, shift left security has generated ...
Letha DunnAugust 15, 20228 min read
What in the World Is a CNAPP (and Do I Need One)?
You’ve heard your CISO talking about CNAPPs (along with CSPM, CWPP, and so on). What is a ...
Letha DunnMay 26, 202211 min read
9 AWS Security Mistakes for DevOps Teams
AWS introduces new complexity to your infrastructure. With that complexity comes ...
Letha DunnMay 6, 20227 min read
5 Reasons Why Cloud Security Policy Fails
In the past year, devastating cloud security breaches have dominated technology ...