
Zero Trust in, and with, the Cloud
Zero trust initially focused on segmenting and securing the network across location and hosting models. Today, however, to be successful, zero trust must also …
Read More »

Zero trust initially focused on segmenting and securing the network across location and hosting models. Today, however, to be successful, zero trust must also …
Read More »
As the above diagram indicates, there are 6 deployment options, for Containers in AWS. It is rather confusing. The deployment model will depend on use cases, s…
Read More »
Role-Based Access Control (RBAC) is a security mechanism in which each access authorization is based on roles that are assigned to a user. With this system, it…
Read More »
DevOps is a combination of specific engineering practices and patterns, followed by cultural changes that increase an organization’s or team’s abil…
Read More »
What’s the difference between PaaS and containers? A PaaS is typically a suite of cloud-based applications that organizations can use to accomplish speci…
Read More »
Observability is at its core, the use of data to analyse what is happening with the system, understand threats and issues such as load or performance and to us…
Read More »

A record number of organizations were using containers and Kubernetes to run their enterprise applications last year, according to the Cloud Native Computing F…
Read More »

Cloud is King, but at times the myths around the King are difficult to comprehend. The ‘Cloud’ is a complete OSI stack and platform and there are extraordinari…
Read More »
(Steps to deploy a Jenkins build server in AWS https://d1.awsstatic.com/Projects/P5505030/aws-project_Jenkins-build-server.pdf) Continuous integration takes co…
Read More »
What are Docker containers? Docker containers are lightweight application hosting environments. Like VMs, they are designed to be easily portable between diffe…
Read More »