How to choose a cloud serverless platform
Posted on March 13, 2021, Level beginner Resource Length long
From AWS Lambda and Azure Functions to Knative and OpenFaaS, we have at least a dozen functions-as-a-service platforms to choose from. Here’s how to navigate the options. By Martin Heller.
Tags serverless cloud lambda cio management
How to build a serverless real-time credit card fraud detection solution
Posted on March 7, 2021, Level intermediate Resource Length medium
As businesses continue to shift toward online credit card payments, there is a rising need to have an effective fraud detection solution capable of real-time, actionable alerts. By Polong Lin and Pavan Kattamuri.
Tags serverless gcp infosec cloud lambda
Kubernetes – Bridging the gap between 5G and intelligent edge computing
Posted on March 6, 2021, Level beginner Resource Length short
An article by Ashish Sharma. In the era of digital transformation, the 5G network is a leap forward. But frankly, the tall promises of the 5G network are cornering the edge computing technology to democratize data at a granular level.
Tags management cio kubernetes cloud
7 Reasons why products fail
Posted on March 5, 2021, Level beginner Resource Length short
What is product failure, anyway? Not all failures are catastrophic where the product is pulled from the market and the company goes out of business. Most are partial or soft failures. By Rick Bess.
Deep dive into Cloud App Discovery
Posted on March 1, 2021, Level beginner Resource Length short
Cloud Discovery, which is one of the Microsoft Cloud App Security (MCAS) features, helps organizations to identity applications and user activities, traffic volume, and typical usage hours for each cloud application. In a nutshell, it can help to detect "Shadow IT" applications and possible risky applications. By Joanna Harding @Microsoft.
Security logging in cloud environments - AWS
Posted on February 26, 2021, Level intermediate Resource Length long
If you had to architect a multi-account security logging strategy, where should you start? This blog, part of the "Continuous Visibility into Ephemeral Cloud Environments" series, will describe a design for a state of the art multi-account security-related logging platform in AWS. By Marco Lancini.
Tags cloud infosec monitoring aws
How to write custom cypher procedures with NetworkX and Memgraph
Posted on February 15, 2021, Level intermediate Resource Length medium
Angular is one of the most popular front-end frameworks, with 30% of developers preferring it for their projects. Angular is especially useful for large scale projects with many different views and components. By Ryan Thelin.
Realizing the full potential of DevSecOps
Posted on February 10, 2021, Level beginner Resource Length medium
An article about four strategies to achieve a true DevSecOps culture. For federal agencies, achieving mission success increasingly hinges on modernizing legacy systems and transforming operations. By Phoebe Nerdahl @Atlassian.com.
Windows 10 Device Guard and Credential Guard demystified
Posted on February 9, 2021, Level intermediate Resource Length medium
While helping Windows Enterprise customers deploy and realize the benefits of Windows 10, I've observed there's still a lot of confusion regarding the security features of the operating system. By Priyanka_Pillai @Microsoft.
CSO's ultimate guide to security and privacy laws, regulations, and compliance
Posted on February 8, 2021, Level beginner Resource Length long
This handy directory provides summaries and links to the full text of each security or privacy law and regulation. By csoonline.com.
Tags cio miscellaneous infosec teams cloud
10 reasons to use Azure SQL in your next project
Posted on February 7, 2021, Level beginner Resource Length long
There are many database technologies available on Azure that you can choose from. Why would you use Azure SQL. By Davide.
Introducing real-time data integration for BigQuery with Cloud Data Fusion
Posted on February 4, 2021, Level beginner Resource Length short
Businesses today have a growing demand for real-time data integration, analysis, and action. More often than not, the valuable data driving these actions—transactional and operational data—is stored either on-prem or in public clouds in traditional relational databases that aren't suitable for continuous analytics. By Bhooshan Mogal.