PinnedPublished inSystem WeaknessDPDP: From Buzzword to Reality: A Long-Term Practical Approach in IndiaThis won 2nd place in ISACA whitepaper contest.Sep 2, 2024Sep 2, 2024
When Life Takes an Unexpected Turn: Finding Strength in the UnplannedLife rarely follows the script we write for ourselves. Despite our carefully laid plans and expectations, the universe has a way of…Feb 28Feb 28
Published inAWS TipAWS Trust Center: Simplifying Cloud Security ManagementCloud security and compliance have become critical concerns for organizations of all sizes today. AWS has responded to these challenges…Feb 281Feb 281
Published inAWS TipSecuring Your AWS S3 Buckets: How to Restrict Access to Specific IAM RolesWhen it comes to cloud security, following the principle of least privilege is essential. In AWS, this means giving users and services only…Feb 28Feb 28
Published inWrite A CatalystRediscovering Purpose Through Life’s mazeThe Wake-Up Call Only Adversity Can RingFeb 221Feb 221
Published inSystem WeaknessElevating Security and Privacy with ServiceNow VaultOrganizations are increasingly relying on cloud platforms to manage workflows, store sensitive data, and drive efficiency. With this shift…Feb 11Feb 11
Published inMr. Plan ₿ PublicationCybersecurity Frameworks and Standards: Overview and ExamplesUK Telecoms (Security) Act 2021Feb 10Feb 10
How to get NIS2 compliant when on GCPCybersecurity is more important than ever in the digital world. For businesses operating in the European Union (EU), the Network and…Feb 6Feb 6
Published inMr. Plan ₿ PublicationAmazon S3 Metadata: A Simple ExplanationFor more details, check out the official AWS announcement here.Jan 31Jan 31
Published inDev GeniusImplementing GCP’s New PCIDSS Policy Bundle for KubernetesThe Payment Card Industry Data Security Standard (PCI DSS) is a critical framework that organizations must adhere to when processing…Jan 30Jan 30