In this post, we'll discuss the role of cyber resilience in security. We will cover the essential components of the cyber resilience framework and how can we improve it.
This post recaps my talk with Scott Lowe, principal field engineer at Kong, about what a service mesh does and when to use it, among other mesh-related questions
In this post, we'll see whether an existing cluster with Kerberos authentication can allow non-root users to authenticate using cert instead of using GSS API
In this blog, we answer some IoT questions to help you understand what a robust security strategy looks like and give you steps to implement a strategy.
If you want to learn Google Cloud Platform and looking for the best resources like courses, books, websites, and tutorials then you have come to the right place.
This blog post explores the need for real-time data streaming with Apache Kafka between applications to enable live commerce across regions, countries, and continents.
As 2022 begins, it is the perfect time to evaluate the tech trends currently shaping the future of pen testing, and how it will continue to do so going forward.
In this tutorial, learn how to use open-source Chronicle Queue and Chronicle Wire to structure applications to use the event-driven architecture (EDA) design pattern.
In this tutorial, we discussed guidelines and considerations for Spring Cloud microservices component tests and provided a recipe for common use cases.
This article explains why web servers are misconfigured, how to exploit Host Header Injection vulnerability to cyber-attacks, and mitigate host header attacks.