SecurEndsNavigating Identity Governance in a Fast-Paced Digital WorldIn today’s rapidly evolving digital landscape, organizations are facing unprecedented challenges in managing identities across their IT…3d ago
Jon VögeFabric Governance: Access & Permission scenarios for sharing Data and Models (+ Security) with End…The ScenarioFeb 18
InTowards DevbyNoelIs Microsoft Entra Suite Right For Your Organization?Microsoft Entra Suite is a comprehensive Identity and Access Management (IAM) platform designed to provide secure, seamless, and scalable…Feb 18Feb 18
InTowards DevbyDisleve KankuSnowflake Chronicles: A Deep Dive into Access Management for Data EngineersSnowflake is a powerhouse in cloud data platforms, providing unparalleled scalability and performance. However, with great power comes the…Feb 4Feb 4
InAWS in Plain EnglishbyJoris ConijnECS Fargate Persistent Storage: EFS Access Points vs. Lambda WorkaroundsWhen running a Docker container on ECS Fargate, persistent storage is often a necessity. I initially attempted to solve this by manually…Feb 4Feb 4
SecurEndsNavigating Identity Governance in a Fast-Paced Digital WorldIn today’s rapidly evolving digital landscape, organizations are facing unprecedented challenges in managing identities across their IT…3d ago
Jon VögeFabric Governance: Access & Permission scenarios for sharing Data and Models (+ Security) with End…The ScenarioFeb 18
InTowards DevbyNoelIs Microsoft Entra Suite Right For Your Organization?Microsoft Entra Suite is a comprehensive Identity and Access Management (IAM) platform designed to provide secure, seamless, and scalable…Feb 18
InTowards DevbyDisleve KankuSnowflake Chronicles: A Deep Dive into Access Management for Data EngineersSnowflake is a powerhouse in cloud data platforms, providing unparalleled scalability and performance. However, with great power comes the…Feb 4
InAWS in Plain EnglishbyJoris ConijnECS Fargate Persistent Storage: EFS Access Points vs. Lambda WorkaroundsWhen running a Docker container on ECS Fargate, persistent storage is often a necessity. I initially attempted to solve this by manually…Feb 4
AshwinDatabricks Secret Scopes: 2 Easy Ways to Create & ManageAre you struggling with securely managing your credentials in Databricks? Look no further! This article will cover two easy ways to create…Feb 3, 2024
Elias Nathan HueckSecuring Remote Access to Cloud: A Guide to IAM, MFA, and Complementary Technologies on AWS, Azure…Securing remote access to cloud resources is critical for protecting sensitive data and ensuring compliance with security policies…Jan 31
Arsen VladimirskiyMapping AWS IAM concepts to similar ones in AzureIn this article, I try to create a short mapping of key AWS IAM (Identity and Access Management) concepts to similar ones in Microsoft…Apr 1, 2022