Category: Cloud

Diagram Description automatically generated

Automated SAST / DAST Pipeline

Automate security checks during application development Figure 1- SAST/DAST Pipeline Architecture DevOps brings together software development and operations to shorten development cycles, allow organizations to be agile, and maintain the pace of innovation while taking advantage of cloud-native technology and...

OT Security : An Introduction

Disclaimer:- This note was written by me ( Mayank Nauni) in my personal capacity. The opinions expressed in this article are solely my own and do not reflect the view of my employer or my preference towards any of the OEMs....

What is SOAR?

SOAR, which stands for Security Orchestration, Automation, and Response, is a cybersecurity strategy that involves using automation and orchestration to improve the efficiency and effectiveness of security operations. SOAR involves integrating multiple security tools and processes, such as threat intelligence,...

Secure Cloud Computing

Disclaimer:- This note was written by me ( Mayank Nauni) in my personal capacity. The opinions expressed in this article are solely my own and do not reflect the view of my employer or my preference towards any of the OEMs....

Why Cloud? ( & Chicken Rice Saga )

Disclaimer:- This note was written by me ( Mayank Nauni) in my personal capacity. The opinions expressed in this article are solely my own and do not reflect the view of my employer or my preference towards any of the OEMs....

Cloud Migration Approach: Basics

Lately, I was struggling to get hold of a document which could possibly explain the cloud migration strategies in  uncomplicated way, as they say that “If you couldn’t explain it simply, perhaps you don’t know it good enough!”, so here...