Understanding Different Techniques for Vulnerability PrioritizationWe discussed how vulnerability is a growing problem. Now we understand how different techniques can be used for vulnerability priorization.Sep 101Sep 101
A Rapidly Growing Problem Named VulnerabilityHas the number of vulnerabilities really grow? If so, why is that? Let's dive deep on this rapidly growing problem named vulnerability.Aug 292Aug 292
Get to know your AWS Managed PoliciesUnderstand what an AWS Managed Policy is and how a simple step can ensure you are using the appropriate one for your needSep 30, 2022Sep 30, 2022
Published inBetter ProgrammingHow to Hit AWS Step Functions Limitations……and how to overcome them.Jun 3, 2022Jun 3, 2022
10 Tips to Kick Start Your Cloud CareerSkycrafters insights on how to start your cloud career sooner than laterJun 14, 2021Jun 14, 2021
Amazon AppFlow — How to Leverage ItHave you heard the news? AWS released yet another service. Understand what it is, what the advantages of using it are, how to use it, and…Apr 29, 2020Apr 29, 2020
Shift Well-Architecture Left. By Extension, Security Will FollowA story on how Infrastructure as Code can be your ally on Well-Architecting and securing your Cloud environmentApr 13, 20201Apr 13, 20201