PinnedXDR for Cloud or Cloud Detection and Response (CDR): An OverviewAs more organizations move their operations to the cloud, the need for robust security measures becomes increasingly important…Nov 6, 2023Nov 6, 2023
PinnedPublished inBetter ProgrammingSecurity Tips for Financial Services App on AWSLet’s Build SecurelySep 28, 20222Sep 28, 20222
PinnedHow to integrate security on the DevOps pipeline?Without a doubt, this may be one of the most common questions from security teams nowadays. The reason behind it is security teams are…Dec 11, 20192Dec 11, 20192
PinnedPutting Security into The IaC PipelineIaC is the new normal on building any new cloud environment through code template, but have you think how integrate security into IaC?May 5, 20203May 5, 20203
PinnedPublished inGeek CultureDefending in Depth S3 BucketsKnowing how to protect your bucket against misconfiguration and possible malicious content inside your buckets.Apr 13, 2021Apr 13, 2021
Cyber Risk Management: Bringing Security to the BoardroomIn the rapidly evolving landscape of cyber threats, organizations face the dual challenge of managing business risk and aligning with…Jan 13, 20241Jan 13, 20241
Published inDevOps.devHow to use CSPM to help your organization against Ransomware attacks targeting data on Amazon S3?Ransomware attacks are becoming more frequent and sophisticated, with crackers targeting cloud-based data storage systems like Amazon S3…Feb 21, 20231Feb 21, 20231
How Home Automation can help you to save money? (Part 2)In my first article about home automation, I covered how I started building my dream home automation and some of the helpful automation…Apr 23, 2022Apr 23, 2022
How do I start building my dream home automation? (Part 1)Since when I was young using technology, loving robots, and watching The Jetsons I had a dream to create much automation as possible in my…Dec 3, 20211Dec 3, 20211
6 Tips to Simply Build Secure and Compliant ContainersThe containers offers numerous benefits for your business, as long you have the right policies, right use, and security tool to protect itDec 1, 2020Dec 1, 2020