Amey LaddadGCP Data Security and Compliance with Generative AIIn today’s digital age, data is a valuable asset that needs to be protected from unauthorized access, misuse, and loss. Ensuring data…11h ago
Taimur IjlalinInfoSec Write-upsThe Ultimate Guide To Creating A Cloud Security StrategyPractical steps to secure your cloud footprintFeb 206
TeekA Look at Cloud Computing ToolsThe ability for keeping, handling, and processing enormous volumes of data remotely is solely due to cloud computing that has profoundly…2d ago162d ago16
Gbemisola EshoThe Google Cloud Cybersecurity CertificateCompanies are moving their digital assets into the Cloud because of the tempting offers of Cloud Computing.1d ago1d ago
Sandeep AgarwalinGoogle Cloud - CommunityGet real-time notifications on IAM privilege grants in Google CloudThis blog shows how you can get alerted in real-time whenever new access permissions are granted across your Google Cloud environment.Nov 1, 20234Nov 1, 20234
Amey LaddadGCP Data Security and Compliance with Generative AIIn today’s digital age, data is a valuable asset that needs to be protected from unauthorized access, misuse, and loss. Ensuring data…11h ago
Taimur IjlalinInfoSec Write-upsThe Ultimate Guide To Creating A Cloud Security StrategyPractical steps to secure your cloud footprintFeb 206
TeekA Look at Cloud Computing ToolsThe ability for keeping, handling, and processing enormous volumes of data remotely is solely due to cloud computing that has profoundly…2d ago16
Gbemisola EshoThe Google Cloud Cybersecurity CertificateCompanies are moving their digital assets into the Cloud because of the tempting offers of Cloud Computing.1d ago
Sandeep AgarwalinGoogle Cloud - CommunityGet real-time notifications on IAM privilege grants in Google CloudThis blog shows how you can get alerted in real-time whenever new access permissions are granted across your Google Cloud environment.Nov 1, 20234
Jeremyah JoelCyber Resilient Architecture: Leveraging Cyber Threat Intelligence to Combat Credential Theft…Hi all! It’s been a while since I’ve shared technical insights on Medium, and today’s deep dive into Cyber Threat Intelligence (CTI) from a…10h ago
James Chiappettainbetter appsecHow Automated AI Code Analysis Can Scale Application SecurityA look at how Generative Artificial Intelligence (Gen AI) tools can help scale an Application Security (AppSec) Engineer’s workflow.Oct 19, 20232