Detect Threats with Runtime Security

Credit to Author: Jiri Sykora| Date: Tue, 16 Aug 2022 00:00:00 +0000

With the increasing use of multi-cloud infrastructure services security has become more complex. You need simplified security for your cloud-native applications with advanced container image scanning, policy-based admission control, and container runtime protection.

Read more

Event-Driven Architectures & the Security Implications

Credit to Author: Sterling Davis| Date: Fri, 12 Aug 2022 00:00:00 +0000

This article explores event-driven architecture (EDA) with a detailed definition and explains how EDA offers many essential benefits to developers. It concludes with an outline of some best practices for mitigating security concerns.

Read more

Well-Architected Framework: Sustainability

Credit to Author: Sterling Davis| Date: Fri, 5 Aug 2022 00:00:00 +0000

One of the key pillars of the AWS Well-Architected Framework (WAF) is sustainability: the idea that cloud applications should be designed to minimize their environmental impact. Gain insight into the WAF sustainability pillar and discover best practices for architecting your cloud applications to improve sustainability.

Read more

Transport Layer Security (TLS): Issues & Protocol

Credit to Author: Duane Seon| Date: Thu, 28 Jul 2022 00:00:00 +0000

Although Transport layer security (TLS) provides enhanced security, cybercriminals have become increasingly savvy, finding ways to circumvent many of these protections. Learn how malicious actors exploit vulnerabilities within TLS to introduce new forms of malware.

Read more

Top 5 Infrastructure as Code Security Challenges

Credit to Author: Michael Langford| Date: Fri, 15 Jul 2022 00:00:00 +0000

Learn how to counteract the top five challenges of IaC and discover how these obstacles pose a threat to security and gain valuable insight in how to mitigate these risks.

Read more

GraphQL vs gRPC: Which One Creates More Secure APIs?


Learn about the security capabilities of GraphQL and gRPC, how they perform authentication/authorization, and how they compare to REST. In addition, discover common attack vectors for both API frameworks and how to prevent them.

Read more

DevOps vs SRE: Differences & Similarities

Credit to Author: Michael Langford| Date: Thu, 30 Jun 2022 00:00:00 +0000

While DevOps and site reliability engineering teams often work together and have shared goals, there are important distinctions between the two. This article explores the differences between their functions and responsibilities.

Read more

Azure vs. AWS Developer Tools

Credit to Author: Michael Langford| Date: Wed, 22 Jun 2022 00:00:00 +0000

Both AWS and Azure developer tools provide key efficiencies in your DevOps environment, learn the comparison between tools, any overlap, and use cases for both.

Read more

Amazon EKS vs Azure Kubernetes Service

Credit to Author: Michael Langford| Date: Thu, 09 Jun 2022 00:00:00 +0000

Managed Kubernetes services help organizations deploy, configure, and manage Kubernetes clusters. This article compares two of the biggest service providers: Amazon EKS and Azure Kubernetes Services.

Read more