PinnedReza AsifOverview of my publicationsThis page aims to reference the articles and guides written by me.Jul 14, 2022Jul 14, 2022
Reza AsifHere is a comprehensive reaction on security relevant points for this article:reaction-on-medium-article-security-focused-system-design-interview-basics-difference-between-d89727db1569May 31, 2023May 31, 2023
Reza AsifReaction on Medium Article (Security focused): “System Design Interview Basics: Difference Between…In this article, we are expanding on the introduction to API Gateways and Load Balancers published by Arslan Ahmad. Our main concern is…May 31, 2023May 31, 2023
Reza AsifinInterviewNoodleData Lake — Securing Big Data and Data AnalyticsFor Tech Leads, Executives, and Senior Developers/ML ExpertsJul 16, 2022Jul 16, 2022
Reza AsifinInterviewNoodleKnow your protocols — Protocols, Ports and their magic use //In The Context of Cyber Sec.“Maybe I can’t read your servers mind, but the Port numbers do in fact speak to me!”Jul 9, 2022Jul 9, 2022
Reza AsifSecurity Series: Threat Modeling 3 — Documentation and DeploymentSecurity has quite a few paths and a lot of challenges. This series aims to help you find your path, learn step by step and bring…Jul 1, 20221Jul 1, 20221
Reza AsifOrchestrator what?— In the Context of Cyber SecurityComplex systems that are multi tiered, are being used in different areas such as test, dev, prod usually have an Orchestrator to roll out…Jun 19, 2022Jun 19, 2022
Reza AsifinFAUN — Developer Community 🐾Security Series: Highly scalable solutions 1 — Setting up the sceneA series focused to explore the security for cloud-native solution with everything that it comes with (Container, Orchestration, Cloud…Dec 9, 2021Dec 9, 2021
Reza AsifinInterviewNoodleSecurity Series: Threat Modeling 2 — System Development Life CycleA series focused to explore the secure by design approach.Nov 16, 2021Nov 16, 2021
Reza AsifSecurity Series: Threat Modeling 1 — IntroductionA series focused to explore the secure by design approach.Nov 14, 2021Nov 14, 2021