PinnedPublished inAWS TipHow to use, and NOT use, AWS Step FunctionsTL;DRMay 20, 2022341May 20, 2022341
Understanding Different Techniques for Vulnerability PrioritizationWe discussed how vulnerability is a growing problem. Now we understand how different techniques can be used for vulnerability priorization.Sep 10, 2024791Sep 10, 2024791
A Rapidly Growing Problem Named VulnerabilityHas the number of vulnerabilities really grow? If so, why is that? Let's dive deep on this rapidly growing problem named vulnerability.Aug 29, 2024722Aug 29, 2024722
Get to know your AWS Managed PoliciesUnderstand what an AWS Managed Policy is and how a simple step can ensure you are using the appropriate one for your needSep 30, 20228Sep 30, 20228
Published inBetter ProgrammingHow to Hit AWS Step Functions Limitations……and how to overcome them.Jun 3, 202274Jun 3, 202274
10 Tips to Kick Start Your Cloud CareerSkycrafters insights on how to start your cloud career sooner than laterJun 14, 20218Jun 14, 20218
Amazon AppFlow — How to Leverage ItHave you heard the news? AWS released yet another service. Understand what it is, what the advantages of using it are, how to use it, and…Apr 29, 202016Apr 29, 202016
Shift Well-Architecture Left. By Extension, Security Will FollowA story on how Infrastructure as Code can be your ally on Well-Architecting and securing your Cloud environmentApr 13, 20201151Apr 13, 20201151