PinnedPublished inDataNext Solutions10-Minute Python Crash CoursePython is one of the most beginner-friendly and versatile programming languages out there. Whether you’re looking to dive into data…Feb 26Feb 26
PinnedPublished inDataNext Solutions5 Ways to Secure your AWS CloudOverviewApr 19, 20211Apr 19, 20211
Published inDataNext SolutionsTop Common Application Security RisksIn today’s world, an online presence is not only required but a necessity for any modern business but going online also comes with many…Dec 26, 20201Dec 26, 20201
Published inDataNext SolutionsHow to Enable Multi-Factor Authentication on Azure PortalIntroductionNov 19, 2020Nov 19, 2020
Published inDataNext SolutionsHow to Provide Read-only Access to the AWS ConsoleOften there is a case when you have to provide read-only access to a user on your AWS account for security, training, or auditing purposes.Oct 6, 2020Oct 6, 2020
Published inDataNext SolutionsWorking with AWS Secret ManagerIn my previous post Exploring AWS Secret Manager, we learned about some key benefits of using AWS Secret Manager. In this post, we will…Feb 25, 20201Feb 25, 20201
Published inDataNext SolutionsExploring AWS Secret ManagerIn this fast-changing world of Cloud, Containers, APIs and Microservices, keeping and managing IT resources is one challenge and securing…Feb 25, 2020Feb 25, 2020
Published inDataNext SolutionsEnabling MFA Delete on AWS S3 BucketsObject storage is a very popular service in the cloud, the first thing normally organizations move to the cloud is the object storage…Dec 17, 20191Dec 17, 20191
Published inDataNext SolutionsMulti-Factor Authentication (MFA) on AWSOverviewJun 15, 2019Jun 15, 2019
Published inDataNext SolutionsPath-based Routing in AWS Application Load BalancerOverviewMay 6, 20191May 6, 20191