PinnedPublished inSystem WeaknessDPDP: From Buzzword to Reality: A Long-Term Practical Approach in IndiaThis won 2nd place in ISACA whitepaper contest.Sep 2, 2024Sep 2, 2024
Published inSystem WeaknessElevating Security and Privacy with ServiceNow VaultIn today’s digital age, organizations increasingly rely on cloud platforms to manage workflows, store sensitive data, and drive efficiency…5d ago5d ago
Published inMr. Plan ₿ PublicationCybersecurity Frameworks and Standards: Overview and ExamplesUK Telecoms (Security) Act 20216d ago6d ago
How to get NIS2 compliant when on GCPCybersecurity is more important than ever in the digital world. For businesses operating in the European Union (EU), the Network and…Feb 6Feb 6
Published inMr. Plan ₿ PublicationAmazon S3 Metadata: A Simple ExplanationFor more details, check out the official AWS announcement here.Jan 31Jan 31
Published inDev GeniusImplementing GCP’s New PCIDSS Policy Bundle for KubernetesThe Payment Card Industry Data Security Standard (PCI DSS) is a critical framework that organizations must adhere to when processing…Jan 30Jan 30
Published inBecome BetterGenuine Happiness in Others’ Success: The Freedom of Celebrating Without EnvyJan 29Jan 29
Is ISO 27001 Sufficient for DORA Compliance?DORA is a regulation, meaning it applies uniformly across all EU member states without the need for national transposition. It focuses on…Jan 24Jan 24
Published inMr. Plan ₿ PublicationAIBOM: Understanding the Bill of Materials for AI Systems very simplyInspiration from original article hereJan 9Jan 9
Published inDev GeniusDocker in Google Cloud: Comparing GKE, Cloud Run, and GCE for Business Use CasesGoogle Cloud Platform (GCP) offers a range of powerful tools for deploying, managing, and scaling docker containers in the cloud. In this…Dec 31, 2024Dec 31, 2024