Nwokolo EmmanuelforCloud Top Gnwokolo.hashnode.net·Nov 30, 2022Basics Of Cloud ComputingIN THIS BLOG YOU WILL DISCOVER What cloud services are What Cloud Computing is Types of cloud computing Cloud computing service providers Pros and Cons of cloud services Characteristics of Cloud Computing Types of cloud services Uses of cloud...Bukola Testimony and 2 others are discussing this3 people are discussing thisDiscuss·5 likes·215 readsCloud Computing
Jenna's RunbooksforJenna's Runbooksjennasrunbooks.hashnode.net·Feb 5, 2023Azure Key Vault Access Policy vs RBACApplying the RBAC permission model to protect 🔐 your Azure Key Vault objects should be used in favor of the access policy option. The vault access policy is applied at the Key Vault scope. Meaning if you had a dozen secrets in your vault, then you'...Discuss·2 likes·128 readsAzureAzure
Chandrasekhar KesavarapuforCloudnloud Tech Communitycloudnloud.hashnode.net·Oct 27, 2022The Hidden Risks of Cloud Computing: Amplifying cloud security conceptsIt's time to start looking into secure cloud models. Previous articles - Is Cloud computing a technology or a Business Enabler?, Cloud Computing Architecture & service models will give you a fair idea on cloud computing basics and working models. In ...Discuss·1 like·556 readscloudcomputingcourse
Nisarg PipaliyaforNisarg's Blognisargpipaliya.hashnode.net·Apr 11, 2023Unleashing the Superheroes🦹 of Cybersecurity: Microsoft's Latest InnovationsAre you concerned about the security of your online activities? The internet can be a dangerous place, with cybercriminals lurking around every corner. It’s essential to have the right tools and strategies to protect yourself and your organization. I...Discuss·1 likeMicrosoft
Muhammad Shahyanforiamshayanrana.hashnode.net·Apr 9, 2023DevOps/Week41: What are the key drivers for moving to the cloud? There are several key drivers for organizations to move to the cloud, including: Cost savings: Cloud computing offers cost savings by reducing the need for on-premises hardware, software licenses, ...Discusscloud-storage
Jenna's RunbooksforJenna's Runbooksjennasrunbooks.hashnode.net·Mar 25, 2023Azure AD & RBAC with Terraform Part 2This article was originally published in January 2023 on my GitHub io blog here Overview After publishing my initial runbook exploring this topic, I decided to test out and implement the HashiCorp for_each meta-argument method for managing the Azure...Discuss·40 readsAzureTerraform
Joseph KarugaforTekChatjkaruga.hashnode.net·Mar 13, 2023How I Passed the (ISC)² Certified in Cybersecurity (CC) Self-Paced Training!Getting certifications in cybersecurity is more crucial as organizations continue to place a high focus on cybersecurity. The self-paced (ISC)2 Certified in Cybersecurity (CC) training program is intended to certify and develop the abilities of indiv...Discuss#cybersecurity
Jenna's RunbooksforJenna's Runbooksjennasrunbooks.hashnode.net·Mar 8, 2023Azure AD & RBAC with Terraform Part 1This article was originally published in September 2022 on my GitHub io blog here Overview The purpose of this runbook is to demonstrate a potential approach to managing Azure AD users, groups and Role-Based Access Control (RBAC) by following Terraf...Discuss·114 readsAzureTerraform
Discovery EngineforCloud Securitycloudsecurityusa.hashnode.net·Feb 24, 2023Why is Cloud Security ImportantCloud Security to Protect Data In today’s digital world, cloud security is essential to protect data from malicious actors online. It involves a set of policies, controls and technologies aimed at protecting sensitive data stored on the cloud from un...Discusscloud security
Yashvi Kothariforyashvikothari.hashnode.net·Feb 17, 2023Prevent Route53 Domain Expiration: Lesson Learned from HotstarI. Introduction II. Amazon Route53 Domain Expiration Protection III. AWS Trusted Advisor IV. How Amazon Route53 and AWS Trusted Advisor could have helped Hotstar V. Trend Micro Conformity VI. How Trend Micro Conformity could have helped prevent Hotst...Discuss·216 readsroute53
Jenna's RunbooksforJenna's Runbooksjennasrunbooks.hashnode.net·Feb 5, 2023Azure Key Vault Access Policy vs RBACApplying the RBAC permission model to protect 🔐 your Azure Key Vault objects should be used in favor of the access policy option. The vault access policy is applied at the Key Vault scope. Meaning if you had a dozen secrets in your vault, then you'...Discuss·2 likes·128 readsAzureAzure
Arosh Jayamannaforkloudy.hashnode.net·Jan 22, 2023Fundamental Concepts of Cloud SecurityIntroduction Cloud computing has become a key component of modern business infrastructure, allowing organizations to access powerful computing resources and storage on demand. However, as data and applications are stored and processed in the cloud, t...DiscussCloud TalksCloud Computing
Burak Cinarforiamburakcinar.hashnode.net·Jan 11, 2023Why should every cybersecurity pro learn Kubernetes?Application security is one of the most exciting cybersecurity sub-fields and keeps evolving year after year. It is a massive field covering everything from Web Application Firewalls (WAF) to source code reviews, code pipelines, static and dynamic te...DiscussKubernetes