Understanding AWS Lambda LayersLambda Layers allow you to package libraries, runtime dependencies, or custom functions separately from the main Lambda deployment package…5d ago5d ago
Kubernetes Security and Observability with AIKubernetes security is increasingly leveraging AI to address dynamic threats and complex attack surfaces. By integrating machine learning…Jun 6Jun 6
Securing Amazon EKS requires addressing common misconfigurations and adopting proactive measures.1. Exposing Kubernetes API Endpoints PubliclyJun 5Jun 5
Kubernetes v1.33 (“Octarine”) on security perspective🚨Kubernetes v1.33 (“Octarine”) made with significant set of enhancements, new features, and some deprecations found. After deployment &…May 22May 22
“Keep learning-always be growing, evolving, and picking up new skills.Tom Cruise’s remarkable and sustained success in Hollywood is the result of a deliberate, multifaceted approach that combines personal…May 19May 19
“State of DevSecOps” report by Datadog(https://lnkd.in/gMZft4Fp),After taking a certain amount of time to read and understand essential challenges identified based on the report. As a devsecops…May 1May 1
The EU’s GDPR Update Could Kill Public Blockchains…Let’s discuss what is happened.According to the epdb post —…Apr 30Apr 30
Leverage Devsecops to handle supply chain attacksThe JP Morgan Chase CISO gives the vital message that software vendors should prioritize secure & resilient by default architectures…Apr 29Apr 29
General challenges and mitigation of RBAC — ABAC — PBAC Access control models..Access control models — Role-Based Access Control (RBAC), Attribute-Based Access Control (ABAC), and Policy-Based Access Control (PBAC) —…Apr 22Apr 22