{"version":"https://jsonfeed.org/version/1","title":"Micro.blog - Gold Fig","home_page_url":"https://micro.blog","feed_url":"https://micro.blog/posts/goldfiglabs","_microblog":{"about":"https://micro.blog/about/api","id":"69944","username":"goldfiglabs","bio":"","pronouns":"","is_following":false,"is_you":false,"following_count":1,"discover_count":0},"author":{"name":"Gold Fig","url":"https://goldfiglabs.micro.blog/","avatar":"https://micro.blog/goldfiglabs/avatar.jpg"},"items":[{"id":"11476373","content_html":"<p>Making sure the things that aren’t supposed to work  don’t work — negative testing your cloud infrastructure and app <img src=\"https://micro.blog/photos/50/https://blog.goldfiglabs.com/uploads/2021/6cc0c30dd0.jpg\" width=\"20\" height=\"20\" class=\"mini_thumbnail\"> : <a href=\"https://blog.goldfiglabs.com/2021/05/20/making-sure-the.html\">blog.goldfiglabs.com</a></p>","summary":"","url":"https://blog.goldfiglabs.com/2021/05/20/making-sure-the.html","date_published":"2021-05-20T18:32:00+00:00","author":{"name":"Gold Fig","url":"https://goldfiglabs.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2Fgoldfiglabs%2Favatar.jpg","_microblog":{"username":"goldfiglabs"}},"_microblog":{"date_relative":"2021-05-20 18:32","date_timestamp":1621535520,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11442552","content_html":"<p>Shifting left is an antiquated way to think about security in a cloud-native world: <a href=\"https://blog.goldfiglabs.com/2021/05/12/shifting-left-is.html\">blog.goldfiglabs.com</a></p>","summary":"","url":"https://blog.goldfiglabs.com/2021/05/12/shifting-left-is.html","date_published":"2021-05-12T20:13:00+00:00","author":{"name":"Gold Fig","url":"https://goldfiglabs.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2Fgoldfiglabs%2Favatar.jpg","_microblog":{"username":"goldfiglabs"}},"_microblog":{"date_relative":"2021-05-12 20:13","date_timestamp":1620850380,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11412058","content_html":"<p>Mediocre persistent threats: infosec basics for startups (part 3) <img src=\"https://micro.blog/photos/50/https://blog.goldfiglabs.com/uploads/2021/77bc7aca33.jpg\" width=\"20\" height=\"20\" class=\"mini_thumbnail\"> : <a href=\"https://blog.goldfiglabs.com/2021/05/04/mediocre-persistent-threats.html\">blog.goldfiglabs.com</a></p>","summary":"","url":"https://blog.goldfiglabs.com/2021/05/04/mediocre-persistent-threats.html","date_published":"2021-05-05T18:04:00+00:00","author":{"name":"Gold Fig","url":"https://goldfiglabs.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2Fgoldfiglabs%2Favatar.jpg","_microblog":{"username":"goldfiglabs"}},"_microblog":{"date_relative":"2021-05-05 18:04","date_timestamp":1620237840,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11391121","content_html":"<p>Mediocre persistent threats: infosec basics for startups (part 2) <img src=\"https://micro.blog/photos/50/https://blog.goldfiglabs.com/uploads/2021/d2b1ee0b41.jpg\" width=\"20\" height=\"20\" class=\"mini_thumbnail\"> : <a href=\"https://blog.goldfiglabs.com/2021/04/30/mediocre-persistent-threats.html\">blog.goldfiglabs.com</a></p>","summary":"","url":"https://blog.goldfiglabs.com/2021/04/30/mediocre-persistent-threats.html","date_published":"2021-04-30T16:51:00+00:00","author":{"name":"Gold Fig","url":"https://goldfiglabs.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2Fgoldfiglabs%2Favatar.jpg","_microblog":{"username":"goldfiglabs"}},"_microblog":{"date_relative":"2021-04-30 16:51","date_timestamp":1619801460,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11362069","content_html":"<p>CSPM (cloud security posture management) and where it fits within your infrastructure <img src=\"https://micro.blog/photos/50/https://blog.goldfiglabs.com/uploads/2021/fceb02ca19.jpg\" width=\"20\" height=\"20\" class=\"mini_thumbnail\"> : <a href=\"https://blog.goldfiglabs.com/2021/04/23/cspm-cloud-security.html\">blog.goldfiglabs.com</a></p>","summary":"","url":"https://blog.goldfiglabs.com/2021/04/23/cspm-cloud-security.html","date_published":"2021-04-23T21:22:00+00:00","author":{"name":"Gold Fig","url":"https://goldfiglabs.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2Fgoldfiglabs%2Favatar.jpg","_microblog":{"username":"goldfiglabs"}},"_microblog":{"date_relative":"2021-04-23 21:22","date_timestamp":1619212920,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11322501","content_html":"<p>Linting cloud infrastructure (part 2) <img src=\"https://micro.blog/photos/50/https://blog.goldfiglabs.com/uploads/2021/c6d5b83dc0.jpg\" width=\"20\" height=\"20\" class=\"mini_thumbnail\"> : <a href=\"https://blog.goldfiglabs.com/2021/04/13/infra-linting-part.html\">blog.goldfiglabs.com</a></p>","summary":"","url":"https://blog.goldfiglabs.com/2021/04/13/infra-linting-part.html","date_published":"2021-04-14T18:26:00+00:00","author":{"name":"Gold Fig","url":"https://goldfiglabs.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2Fgoldfiglabs%2Favatar.jpg","_microblog":{"username":"goldfiglabs"}},"_microblog":{"date_relative":"2021-04-14 18:26","date_timestamp":1618424760,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11289549","content_html":"<p>Cloud infrastructure linting even if you aren’t 100% IaC <img src=\"https://micro.blog/photos/50/https://blog.goldfiglabs.com/uploads/2021/d40091c6a7.jpg\" width=\"20\" height=\"20\" class=\"mini_thumbnail\"> : <a href=\"https://blog.goldfiglabs.com/2021/04/07/cloud-infrastructure-linting.html\">blog.goldfiglabs.com</a></p>","summary":"","url":"https://blog.goldfiglabs.com/2021/04/07/cloud-infrastructure-linting.html","date_published":"2021-04-07T16:01:00+00:00","author":{"name":"Gold Fig","url":"https://goldfiglabs.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2Fgoldfiglabs%2Favatar.jpg","_microblog":{"username":"goldfiglabs"}},"_microblog":{"date_relative":"2021-04-07 16:01","date_timestamp":1617811260,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11214213","content_html":"<p>Understanding Infrastructure-as-Deployed: <a href=\"https://blog.goldfiglabs.com/2021/03/23/understanding-infrastructureasdeployed-engineering.html\">blog.goldfiglabs.com</a></p>","summary":"","url":"https://blog.goldfiglabs.com/2021/03/23/understanding-infrastructureasdeployed-engineering.html","date_published":"2021-03-23T20:18:51+00:00","author":{"name":"Gold Fig","url":"https://goldfiglabs.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2Fgoldfiglabs%2Favatar.jpg","_microblog":{"username":"goldfiglabs"}},"_microblog":{"date_relative":"2021-03-23 20:18","date_timestamp":1616530731,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11145260","content_html":"<p>Introducing rpCheckup - Find Backdoors and Public Access In AWS Resource Policies: <a href=\"https://blog.goldfiglabs.com/2021/03/10/introducing-rpcheckup-find.html\">blog.goldfiglabs.com</a></p>","summary":"","url":"https://blog.goldfiglabs.com/2021/03/10/introducing-rpcheckup-find.html","date_published":"2021-03-10T19:48:00+00:00","author":{"name":"Gold Fig","url":"https://goldfiglabs.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2Fgoldfiglabs%2Favatar.jpg","_microblog":{"username":"goldfiglabs"}},"_microblog":{"date_relative":"2021-03-10 19:48","date_timestamp":1615405680,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11069697","content_html":"<p>When should my startup prioritize infosec? <img src=\"https://micro.blog/photos/50/https://blog.goldfiglabs.com/uploads/2021/879e082f89.jpg\" width=\"20\" height=\"20\" class=\"mini_thumbnail\"> : <a href=\"https://blog.goldfiglabs.com/2021/02/23/when-should-my.html\">blog.goldfiglabs.com</a></p>","summary":"","url":"https://blog.goldfiglabs.com/2021/02/23/when-should-my.html","date_published":"2021-02-24T19:21:00+00:00","author":{"name":"Gold Fig","url":"https://goldfiglabs.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2Fgoldfiglabs%2Favatar.jpg","_microblog":{"username":"goldfiglabs"}},"_microblog":{"date_relative":"2021-02-24 19:21","date_timestamp":1614194460,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}},{"id":"11001983","content_html":"<p>Do The Basics First - What To Check Before Launching on AWS: <a href=\"https://blog.goldfiglabs.com/2021/02/11/do-the-basics.html\">blog.goldfiglabs.com</a></p>","summary":"","url":"https://blog.goldfiglabs.com/2021/02/11/do-the-basics.html","date_published":"2021-02-11T19:04:00+00:00","author":{"name":"Gold Fig","url":"https://goldfiglabs.micro.blog/","avatar":"https://cdn.micro.blog/photos/96/https%3A%2F%2Fmicro.blog%2Fgoldfiglabs%2Favatar.jpg","_microblog":{"username":"goldfiglabs"}},"_microblog":{"date_relative":"2021-02-11 19:04","date_timestamp":1613070240,"is_favorite":false,"is_bookmark":false,"is_deletable":false,"is_conversation":false,"is_linkpost":true,"is_mention":false,"note":"","syndication":[]}}]}