Pallab ChatterjeeThe Battle Against Ransomware: Protecting Your Business and DataIn the fast-paced digital landscape of today, the threat of ransomware has emerged as a menacing force, targeting organizations across…Aug 14, 2023Aug 14, 2023
Pallab ChatterjeeAWS GovCloud Landing Zone — A destination for FedRAMP High, DoD IL4 and ITAR workloadsAWS GovCloud Landing Zone is a pre-configured and pre-defined AWS environment that can be quickly deployed to support the needs of…May 16, 2023May 16, 2023
Pallab ChatterjeeHow to protect PII/PHI data in an Amazon S3 bucket from accidental and intentional data breaches?In today’s data-driven world. Storing and protecting Personally Identifiable Information (PII) and Protected Health Information (PHI) is…May 14, 2023May 14, 2023
Pallab ChatterjeeWindows authentication for Amazon EKS Windows based workloadElastic Load Balancer (ELB) is typically used for non-Windows workloads in Amazon Elastic Kubernetes Service (EKS). It distributes incoming…May 9, 2023May 9, 2023
Pallab ChatterjeeBlue Green Deployment for Containerized workloadDeploying applications to container can be challenging when it comes to minimizing downtime and maintaining application availability during…May 7, 2023May 7, 2023
Pallab ChatterjeeCanary Deployment for AWS LambdaWhen it comes to deploying serverless applications on AWS Lambda, there are several deployment strategies to choose from. One of the most…May 7, 2023May 7, 2023
Pallab ChatterjeeHow to recover encrypted data when a KMS key with imported key material is deleted?Customers use AWS Key Management Service (AWS KMS) keys with imported key material to help meet their regulatory and compliance…May 4, 2023May 4, 2023