Securing the Cloud #30
Welcome to the 30th edition of the Securing the Cloud Newsletter! In this issue, we dive into the latest trends and insights in cloud security, explore career development opportunities, and …
Developer Advocate | CCIES #23837 | Security Specialist
Welcome to the 30th edition of the Securing the Cloud Newsletter! In this issue, we dive into the latest trends and insights in cloud security, explore career development opportunities, and …
Welcome to the 29th edition of the Securing the Cloud Newsletter! In this issue, we dive into the latest trends and insights in cloud security, explore career development opportunities, and …
Welcome to the 28th edition of the Securing the Cloud Newsletter! In this issue, we dive into the latest trends and insights in cloud security, explore career development opportunities, and …
In the previous parts of this series, I set up a base architecture for AWS Threat Detection and Management, deployed AWS WAF, AWS Shield Advanced, GuardDuty, Inspector, and AWS Config. …
In today’s world, cyber threats are a constant concern for individuals and organizations alike. As more and more data and operations move to the cloud, understanding threat detection and management …
Infrastructure protection on AWS is crucial, especially with the ever-evolving threat landscape. On AWS, there are various infrastructure protection services that can help you secure your cloud environment. Some of …
In this blog post, we’ll dive deep into some code that illustrates the convergence of Streamlit, an open-source app framework for Machine Learning and Data Science projects, and Generative AI, …