Nancy MuriithiAdvanced Credential Rotation for IAM Users.A combination of the access key id and secret access key does not normally expire since the credentials associated with an IAM user are…Aug 17, 2023Aug 17, 2023
Nancy MuriithiSOFTWARE SUPPLY CHAINWhy is software supply chain security criticalJun 19, 2023Jun 19, 2023
Nancy MuriithiinAWS TipAccess Your AWS Resources PrivatelyAccess Your AWS Resources PrivatelyJan 17, 2023Jan 17, 2023
Nancy MuriithiCloud Security — Best Practices for DevSec Ops.Hello Cloud technology enthusiast!Dec 14, 2022Dec 14, 2022
Nancy MuriithiData Exfiltration on CloudData exfiltration is defined as when an unauthorized person extracts data from the secured systems where it belongs, and moves it to…Dec 14, 2022Dec 14, 2022
Nancy MuriithiWhat is Kubernetes?Modern software is increasingly run as fleets of containers, sometimes called microservices. A complete application may comprise many…Dec 14, 2022Dec 14, 2022