In this article, I will explain how you can use Amazon Macie to automatically classify sensitive data in S3 with a quick tutorial for beginners to use Amazon Macie
The Perl Log::Log4perl library isn’t vulnerable to the recent Java Log4j “Log4Shell” security issue. Consider using it in addition to regular debugging.
Sometimes a highly scientific performance test doesn't speak well about the end result you might end up with. Using a "fully-fledged app" is therefore better.
In this post, we will cover the best security practices for database servers, be it cloud servers or your own servers, to protect data proprietary and avoid data loss.
In this post, we'll learn to create a NestJS Redis Microservice using the Redis transporter. This transporter leverages the publish/subscribe messaging paradigm.
This article is intended for beginners who want to quickly learn the basics of working in MongoDB without getting into the documentation and tutorials on YouTube.
In this article, I will highlight some extremely important features available which can be learned and implemented quickly when migrating from directly Java 8 to Java 17.
There’s a new name popping up in the developer circles: platform operations or “platform ops”. Read this article to understand what it is and what can it do.
In this article, I share some important lessons from our experience and what we learned after five years of developing and supporting low latency microservices.
Learn why IaC is a great tool for SREs in particular, offering special advantages for enforcing configurations that maximize reliability across all IT assets.
Loss of data can bankrupt a company. To prevent that, you must create a data loss prevention policy that will protect your business without bottlenecking your growth.