Category: Mix
Learn about Content Security Policy (CSP), its importance, how it works, and how it enhances web security. What is Content…
Setting up new Wi-Fi? Picking the type of password you need can seem like an arbitrary choice. After all, WEP,…
You can now subscribe to my email list on victoria.dev! Here’s how I lovingly built a subscription sign up flow…
A significant part of the process of creation is the ability to imagine things that do not yet exist. This…
In the tech teams I lead, “priority” has no plural form. Whether you’re leading a team of people or leading…
If you’ve ever half-written a software project before taking a few days off, this is the article you’ll discover you…
I used to think that when I wanted to make updates to a project, I ought to hold back and…
As a Director of Engineering, I’m a software developer who hires and leads other software developers. It’s not surprising then…
How long does it take for a bug to get squashed, or for a pull request to be merged? What…
Here’s a practice I use personally and encourage within my open source projects and any small teams I run for…
4 ways Google uses AI for security, catalog of AWS threat actor techniques, training a custom small language model to…
Many tech professionals see integrating large language models (LLMs) as a simple process -just connect an API and let it…



![[tl;dr sec] #284 – Google Cloud CISO Interview, AWS Threat Technique Catalog, Finding Secrets with AI [tl;dr sec] #284 - Google Cloud CISO Interview, AWS Threat Technique Catalog, Finding Secrets with AI](https://image.cybernoz.com/wp-content/uploads/2025/06/tldr-sec-284-Google-Cloud-CISO-Interview-AWS-Threat.png)
