DEV Community

Public_Cloud profile picture

Public_Cloud

Everything around Cloud Security!

Location Nevada Joined Joined on 
Overcoming Challenges in Shifting Left Security: Practical Tips and Considerations

Overcoming Challenges in Shifting Left Security: Practical Tips and Considerations

Comments
3 min read
Shifting Left for Compliance: How to Meet Security Requirements Early

Shifting Left for Compliance: How to Meet Security Requirements Early

Comments
3 min read
Static Application Security Testing (SAST): Finding Vulnerabilities Early in the Development Process

Static Application Security Testing (SAST): Finding Vulnerabilities Early in the Development Process

Comments
3 min read
CI/CD Pipeline Stages: A Breakdown

CI/CD Pipeline Stages: A Breakdown

Comments
2 min read
Cloud Service Providers and Their Security Responsibilities: A Comprehensive Guide

Cloud Service Providers and Their Security Responsibilities: A Comprehensive Guide

1
Comments
2 min read
Vendor Segmentation and Risk Prioritization: A Strategic Approach

Vendor Segmentation and Risk Prioritization: A Strategic Approach

Comments
2 min read
Regulatory Compliance and Vendor Risk: A Critical Relationship

Regulatory Compliance and Vendor Risk: A Critical Relationship

Comments
3 min read
Cloud-Native Security for Multi-Cloud and Hybrid Cloud Environments

Cloud-Native Security for Multi-Cloud and Hybrid Cloud Environments

Comments
4 min read
The Role of Penetration Testing in Vulnerability Management

The Role of Penetration Testing in Vulnerability Management

Comments
4 min read
The Vulnerability Management Lifecycle: From Discovery to Remediation

The Vulnerability Management Lifecycle: From Discovery to Remediation

Comments
3 min read
Securing the Cloud Frontier: Generative AI for Vulnerability Hunting

Securing the Cloud Frontier: Generative AI for Vulnerability Hunting

1
Comments
4 min read
Cloud Over-Privileged Accounts: A Recipe for Disaster (and How to Avoid It)

Cloud Over-Privileged Accounts: A Recipe for Disaster (and How to Avoid It)

1
Comments
3 min read
Cloudanix and it's CWPP

Cloudanix and it's CWPP

Comments
2 min read
How does Amazon explain its value of EKS support

How does Amazon explain its value of EKS support

Comments
2 min read
Channel Your Inner Scrooge with Redshift Reserved Instances: Slash Your Cloud Bill Like a Boss

Channel Your Inner Scrooge with Redshift Reserved Instances: Slash Your Cloud Bill Like a Boss

Comments
2 min read
What is AKS Cluster

What is AKS Cluster

Comments
1 min read
Don't Go Rogue: Leverage Frameworks for Effective Cloud Security Prioritization

Don't Go Rogue: Leverage Frameworks for Effective Cloud Security Prioritization

Comments
2 min read
Cloud Complexity: A Growing Challenge after Adoption

Cloud Complexity: A Growing Challenge after Adoption

Comments
2 min read
Code Security

Code Security

Comments
2 min read
Identity and Access Management - Why does it need attention?

Identity and Access Management - Why does it need attention?

1
Comments
2 min read
Bridging the Cloud Security Gap: From Innovation to Operational Integration

Bridging the Cloud Security Gap: From Innovation to Operational Integration

Comments
2 min read
Benefits of using Azure AKS?

Benefits of using Azure AKS?

Comments
1 min read
loading...