Explore by tag
All Tags
Cloud security in 2026 (part 3): Securing generative AI on AWS and Google
We’ve already secured the business strategy and the identity architecture. Now, we face the final...
Cloud security in 2026 (part 2): Why identity is your new firewall
Your data now lives on servers you don’t own, it is accessed by employees working in coffee shops,...
Most popular
Cloud security in 2026 (part 1): From shared responsibility to shared fate
If you are still using a security strategy from 2023, you have a problem. The old idea that the...
Cloud anomaly detection explained
In the realm of cloud computing, managing costs effectively is as crucial as leveraging its vast...
Revolgy achieves AWS Digital Workplace Competency Status
Prague, April 28, 2022 - Revolgy achieves Amazon Web Services (AWS) Digital Workplace Competency...
Complete guide for picking the right tool for Terraform Security Code Analysis
Are you puzzled from the wide range of choices of static analysis tools for Terraform? We looked at...
Advanced API Routing in EKS with Traefik, AWS LoadBalancer Controller and External-DNS
Have you been thinking about how to distribute incoming HTTP(S) (and TCP) requests in EKS? This...