PinnedThe_NeelguyUnleashing the Power of DevOps in 5 minsLearn the concepts of DevOps under 5 mins using AWSAug 13Aug 13
PinnedThe_NeelguyinAWS TipPART 2: Deploying Your Django News Aggregator Application in KubernetesDeploy your application in Kubernetes with containerization by …Aug 62Aug 62
PinnedThe_NeelguyinAWS TipBuilding and Deploying a News Aggregator Application with Django, Docker and ECR in AWS EC2Deploy your application in your own server in Cloud by …Aug 11Aug 11
PinnedThe_NeelguyMy Journey as a Software Engineering Intern at HoneywellAs a Software Engineering Intern, my primary project was to…Jul 211Jul 211
The_NeelguyResilient Clouds: Enhancing Cybersecurity in the Digital EraThe importance of building resilient cloud environments….May 232May 232
The_NeelguyRevolutionizing Cybersecurity with the Power of AIEnter Artificial Intelligence (AI). AI is revolutionizing cybersecurity in ways that…Oct 7, 20231Oct 7, 20231
The_NeelguyZero Trust Security: A Paradigm Shift in CybersecurityZero Trust Security, a proactive and comprehensive approach that assumes no implicit trust in any user or device…Jul 20, 20231Jul 20, 20231
The_NeelguyWormGPT — The starting of an unethical eraWormGPT possesses the ability to autonomously replicate and spread, making it a self-propagating entity…Jul 18, 20231Jul 18, 20231
The_NeelguyLearn NIST Framework under 3 minsBy understanding the framework and its practical applications, organizations can…Jul 3, 20231Jul 3, 20231
The_NeelguyKnow the differences between Offensive Security and Defensive SecurityIn the realm of cybersecurity, two prominent approaches take center stage: defensive security and offensive security. While both aim to…Jun 29, 20232Jun 29, 20232