PCG logo

Insights

Filter by tags

All tags

Filter by industries

All industries

Article
Google Workspace: A more secure alternative?

Discover how Google Workspace protects your business from modern cyber threats with AI-powered defence, cloud security and data protection.

Learn more
Article
Microsoft Modern Workplace Security: An Essential Component for the Modern Work Environment

Explore key security strategies for the Modern Workplace and protect your digital environment from modern cyber threats.

Learn more
Article
Protecting Lambda URLs with Cognito, IAM, Lambda@Edge and CDK

In this article, we’ll look at how to secure Lambda URLs using IAM access control. With complete code to try yourself!

Learn more
Case Study
Energy & Utilities
Google Drive Data Separation Within a Single Google Workspace Tenant

PCG analyzed, migrated, and restructured Viessmann's Google Drive to ensure a secure data separation while minimizing disruption to both entities.

Learn more
Case Study
Education
Cloud Migration
Education
Transforming Robotics Research: RCCL's Migration to AWS

Discover how the Robotics, Automatic Control, and Cyber-Physical Systems Laboratory (RCCL) leveraged AWS to support their advanced research in robotics and IoT data analysis. Learn how they managed real-time sensor data, machine learning techniques, and MATLAB computations on a scalable, secure platform.

Learn more
Article
AWS Managed Grafana for one or multiple AWS Organizations

In this article, I will explain how AWS Managed Grafana can be used to easily monitor CloudWatch Log Groups and metrics across entire AWS Organizations and create comprehensive dashboards.

Learn more
Article
Cloud Security
Balancing Act Between Security and Progress in the Era of NIS2

Microsoft Cyber Security Assessment & NIS2 | How to meet NIS2 requirements while elevating your security to a higher level.

Learn more
Article
Kotlin : A Java developer's perspective

A simple list of features from my first hands-on experience on a project combining Java and Kotlin.

Learn more
Article
Securing APIs in an AWS Cloud Environment

In 2019, a major financial services company, Capital One, experienced a severe security breach caused by a misconfigured API. This breach exposed the personal data of over 100 million customers, including sensitive information such as names, addresses, and social security numbers. The incident not only inflicted substantial financial and reputational damage on the company but also underscored the critical importance of securing APIs in today’s interconnected world.

Learn more
Article
AI
Machine Learning
The 5 Types of AI Every Small Business Should Know

A practical guide on five types of AI—Generative AI, Machine Learning, NLP & LLMs, RPA, and Computer Vision—exploring their relevance and use cases for small businesses to improve operations and customer engagement.

Learn more
12345678910111213141516171819202122232425262728293031323334353637383940414243Takes you to the next page of the pagination

Let's work together

United Kingdom
Arrow Down