Category: Mix

Understanding Content Security Policy (CSP)
23
Jun
2025

Understanding Content Security Policy (CSP)

Learn about Content Security Policy (CSP), its importance, how it works, and how it enhances web security. What is Content…

23
Jun
2025

WPA Key, WPA2, WPA3, and WEP Key: Wi-Fi security explained

Setting up new Wi-Fi? Picking the type of password you need can seem like an arbitrary choice. After all, WEP,…

Build your own serverless subscriber list with Go and AWS
23
Jun
2025

Build your own serverless subscriber list with Go and AWS

You can now subscribe to my email list on victoria.dev! Here’s how I lovingly built a subscription sign up flow…

23
Jun
2025

What is TCP/IP? Layers and protocols explained

A significant part of the process of creation is the ability to imagine things that do not yet exist. This…

23
Jun
2025

Do One Thing: Mastering Prioritization for High-Performing Teams

In the tech teams I lead, “priority” has no plural form. Whether you’re leading a team of people or leading…

23
Jun
2025

How to Write Good Documentation

If you’ve ever half-written a software project before taking a few days off, this is the article you’ll discover you…

23
Jun
2025

Be brave and build in public

I used to think that when I wanted to make updates to a project, I ought to hold back and…

23
Jun
2025

How to become a software developer

As a Director of Engineering, I’m a software developer who hires and leads other software developers. It’s not surprising then…

23
Jun
2025

Beyond Gut Feelings: How I Use Issue Metrics to Boost Engineering Velocity

How long does it take for a bug to get squashed, or for a pull request to be merged? What…

22
Jun
2025

Mastering Git for Small Teams

Here’s a practice I use personally and encourage within my open source projects and any small teams I run for…

[tl;dr sec] #284 - Google Cloud CISO Interview, AWS Threat Technique Catalog, Finding Secrets with AI
19
Jun
2025

[tl;dr sec] #284 – Google Cloud CISO Interview, AWS Threat Technique Catalog, Finding Secrets with AI

4 ways Google uses AI for security, catalog of AWS threat actor techniques, training a custom small language model to…

Five Uncomfortable Truths About LLMs in Production — API Security
19
Jun
2025

Five Uncomfortable Truths About LLMs in Production — API Security

Many tech professionals see integrating large language models (LLMs) as a simple process -just connect an API and let it…