Published inAWS in Plain EnglishAutomating AWS IAM Access Key ManagementAutomate IAM key deactivation on AWSJan 27Jan 27
Published inAWS in Plain EnglishSecuring Cloud Workloads with Amazon InspectorStreamline Cloud Security with Automated Vulnerability Management and Compliance Scans for EC2, Lambda, and ECRDec 5, 2024Dec 5, 2024
Published inAWS in Plain EnglishHow to Secure Amazon Bedrock with Guardrails for Safe AI Operations in the CloudA Step-By-Step Guide To Configuring Amazon Bedrock GuardrailsAug 27, 2024Aug 27, 2024
Published inAWS in Plain EnglishHow to Set Up GuardDuty Alerts with SNS for Email & Slack NotificationsA Step-By-Step Guide To Setting Up Email & Slack Notifications For Amazon GuardDutyJul 18, 2024Jul 18, 2024
Published inBits and PiecesTop 10 Microservice Anti-PatternsTen Common Anti-Patterns and How to Avoid ThemFeb 26, 202416Feb 26, 202416
Published inBits and PiecesFrontend Application Security: Tips and TricksA Comprehensive Guide to Application SecurityFeb 16, 20242Feb 16, 20242
Published inBits and Pieces10 Ways To Securing Microservices in 2024How To Build Secure Microservices in 2024?Jan 16, 2024Jan 16, 2024
Published inBits and PiecesTop 10 Web Application Security Threats to Look Out For in 2024Build secure web applications in 2024 by keeping an eye out for these 10 threats!Jan 1, 20241Jan 1, 20241
Published inBits and PiecesHow To Safely Integrate AI Into Your Next Software Project?Evaluating the European Union AI Act for Safe AI Usage in 2024Dec 21, 20231Dec 21, 20231
Published inBits and PiecesMACH Architecture for Frontend DevelopmentUtilizing Microservices, API-First, Cloud Native and Headless architectures for frontend development in 2024.Oct 10, 2023Oct 10, 2023