Filter by industries
All industries
In this article, we’ll look at how to secure Lambda URLs using IAM access control. With complete code to try yourself!
PCG analyzed, migrated, and restructured Viessmann's Google Drive to ensure a secure data separation while minimizing disruption to both entities.
Discover how the Robotics, Automatic Control, and Cyber-Physical Systems Laboratory (RCCL) leveraged AWS to support their advanced research in robotics and IoT data analysis. Learn how they managed real-time sensor data, machine learning techniques, and MATLAB computations on a scalable, secure platform.
In this article, I will explain how AWS Managed Grafana can be used to easily monitor CloudWatch Log Groups and metrics across entire AWS Organizations and create comprehensive dashboards.
Microsoft Cyber Security Assessment & NIS2 | How to meet NIS2 requirements while elevating your security to a higher level.
A simple list of features from my first hands-on experience on a project combining Java and Kotlin.
In 2019, a major financial services company, Capital One, experienced a severe security breach caused by a misconfigured API. This breach exposed the personal data of over 100 million customers, including sensitive information such as names, addresses, and social security numbers. The incident not only inflicted substantial financial and reputational damage on the company but also underscored the critical importance of securing APIs in today’s interconnected world.
A practical guide on five types of AI—Generative AI, Machine Learning, NLP & LLMs, RPA, and Computer Vision—exploring their relevance and use cases for small businesses to improve operations and customer engagement.
Remote work is here to stay, but challenges remain in security and IT management. Learn how Microsoft’s Azure Virtual Desktop (AVD) helps companies overcome these hurdles to stay productive and secure.
How CyberCompare automates subscription management processes.