Amit Sidesamitsides.hashnode.dev·Nov 13, 2024AI & Cyber Security: Exploiting Insights from High-Dimensional Vectors SpacesIntroduction ( Quick note on Article focus: not on the HOW vector embeddings are generated but the WHAT capabilities of these representations per se in cybersecurity) Many modern machine learning and deep learning algorithms, such as neural networks,...Discuss#cybersecurity
Olpu Siva Reddyolpusivareddy.hashnode.dev·Nov 10, 2024Devops Day1What is devops ? At first everyone will say Devops is simple, derived from the words of development and operations. In broader terms we can say it is a combination of Software development and IT operations team. In Simple somebody will say, Devops wi...DiscussDevops
Subhanshu Mohan Guptablogs.subhanshumg.com·Oct 17, 2024Picking the Right Load Balancer for Your Kubernetes EnvironmentIntroduction As Kubernetes adoption skyrockets, managing traffic within and to your clusters becomes a critical aspect of ensuring availability, performance, and scalability. One of the most important decisions when running Kubernetes in production i...Discuss·14 likes·41 readsMastering Kubernetes: Revolutionizing Cloud-Native OperationsLoad Balancing
Bisola Adedijibeesola.hashnode.dev·Sep 28, 2024How To Install Wazuh Manager on a Cloud ServiceWazuh is a powerful open-source security platform that provides threat detection, integrity monitoring, and incident response capabilities. One of the key components of Wazuh is the Wazuh Manager, responsible for data collection, threat analysis, and...Discuss·74 readsSecurity
Build With Ilacodecanvas8061.hashnode.dev·Sep 11, 2024Passing sensitive values to Terraform ModulesTerraform provides huge flexibility to its users by enabling them to write code as small, specific, self-contained components of code known as Modules. It becomes easier to manage a complex project. With Modules, one can create Reusable Templates for...Discussterraform modules
Tanishka Marrottcloud-design-diaries.hashnode.dev·Aug 11, 2024Crafting a Holistic Security Posture with Organization Policy Constraints (OPCs) and Service Control Policies (SCPs)As a member of the cloud security team, it’s crucial to understand how these tools work, their technical implementations, and the scenarios where exceptions might be necessary. Let’s explore the top 5 OPCs and SCPs that can bolster your organization'...Discuss·1 likeAWS
Tanishka Marrottcloud-design-diaries.hashnode.dev·Aug 7, 2024A Day in the Life of a Cloud Security Engineer : Safeguarding the Digital FrontierIntroduction As the sun rises, a Cloud Security Engineer begins another day of safeguarding the digital frontier. Meet Tanishka, whose journey into the world of cloud security began a couple of years back, Her role is not just about reacting to d...Discuss·1 likeprisma cloud
Balajibalajidevops.hashnode.dev·Mar 29, 2024Title: Exploring Prowler: A Comprehensive Guide to AWS Security and Compliance MonitoringIntroduction: In today's cloud-centric world, ensuring the security and compliance of AWS (Amazon Web Services) environments is paramount for organizations of all sizes. Prowler, an open-source security tool, has emerged as a powerful solution for au...Discuss·2 likes·104 readsAWS
Alice Githuialicegithui.hashnode.dev·Mar 12, 2024OWASP Top 10 2023The OWASP (Open Worldwide Application Security Project) Top 10 is a regularly released report that details the security risks for web application security, focusing on the top 10 security concerns. It aims to provide tools and resources to make web a...DiscussOWASP TOP 10
MeghOpsforMeghOpsblog.meghops.io·May 10, 2023How MeghOps Can Make SecOps Easy?MeghOps is a CSPM solution. CSPM stands for Cloud Security Posture Management. It refers to the process of monitoring and managing the security posture of cloud environments to ensure that they comply with security policies and regulations. CSPM solu...Discuss·31 readsSecurity