How to implement AWS Sustainability Pillar principles

Credit to Author: Joy Ngaruro| Date: Fri, 27 May 2022 00:00:00 +0000

Learn more about the AWS Well-Architected Framework Sustainability Pillar and how to securely and efficiently implement the six design principles to help you reduce your environmental impact while balancing agility and operational excellence.

Read more

Detect Azure AD Hybrid Cloud Vulnerabilities

Credit to Author: Jiri Sykora| Date: Thu, 19 May 2022 00:00:00 +0000

AADInternals is a PowerShell module widely used by administrators for administering Azure Active Directory (AD) and Microsoft 365 – learn how to protect against their common vulnerabilities.

Read more

Adding Guardrails To A Cloud Account After The Fact

Credit to Author: Melanie Tafelski| Date: Wed, 11 May 2022 00:00:00 +0000

This article outlines a priority checklist of which guardrails need to be applied to an existing cloud account. Answering questions like, can these guardrails be implemented without breaking anything? What level of testing is required?

Read more

Mitigate Top 5 Common Cybersecurity Vulnerabilities

Credit to Author: Melanie Tafelski| Date: Tue, 22 Mar 2022 00:00:00 +0000

Vulnerabilities in software and infrastructure are a fact of life for developers and SREs. But when you understand vulnerabilities, you can minimize their impact. Learn more about five common threats and how to mitigate them.

Read more

How to Build a Serverless API with Lambda and Node.js

Credit to Author: Michael Langford| Date: Tue, 15 Mar 2022 00:00:00 +0000

Is your app server serving more stress than function? Explore this walkthrough for configuring and deploying a serverless API and discover the vast benefits of letting cloud services manage your infrastructure.

Read more