With the quantity of data that organizations have today, there are exponentially more risks. Countering those risks includes looking at cyber security holistically and following four basic steps to protect your data.
As Microservices is now becoming the most preferred method for creating cloud native distributed applications, it poses many security challenges. Secrets Management is a critical component of container based application security.
When it comes to collecting and shipping logs to Elastic stack, we usually hear about ELK – Elastic, Logstash and Kibana. It has almost become a synonym for Elastic stack. But when it comes to technology, there is never a perfect solution. Fluentd is gaining popularity as far as logging
One of the most damaging threats any business, big or small, could face is to become a victim of cybercrime such as ransomware. As the term suggests, ransomware is a malicious software designed to infiltrate and block access to an organisation’s data until a ransom is paid or the demands
There is a huge industry wide shift towards Microservices replacing monolithic application stacks to provide simplified and quick application deployments, scale up/down capabilities and accelerated development. But with all the functional and delivery advantages, it also increases the operational complexity. Monitoring and troubleshooting microservices is more complex due to its
Amazon Simple Notification Service (Amazon SNS) is a web service that enables applications, end-users, and devices to instantly send and receive notifications from the cloud. A Topic is a communication channel to send messages and subscribe to notifications. It provides an access point for publishers and subscribers to communicate with each