How API works?An API, or Application Programming Interface, is a software intermediary that allows two applications to talk to each other. In other…Jun 13, 2023Jun 13, 2023
NoSQL Database — Introduction to MongoDBNoSQL Database — We now live in a data-driven culture, and this is the era of Big Data. The 3-V’s, or vast volume, high velocity, and…Apr 5, 2022Apr 5, 2022
AWS RDS Databases — Detailed Look at Relational Database ServiceAWS RDS Databases — (Amazon Relational Database Service) is a web service that makes it easy to set up, administer, and scale a relational…Apr 5, 2022Apr 5, 2022
Published inCodeXWhat is third-party risk management?Third-party risk management (TPRM) is a type of risk management that focuses on identifying and mitigating risks associated with the usage…Mar 9, 2022Mar 9, 2022
Published inCodeXWhat is BYOD (Bring Your Own Device) PolicyBYOD, or Bring Your Own Device, is a growing trend in which employees use their personal devices for work. Companies that implement BYOD…Mar 9, 2022Mar 9, 2022
Published inCodeXWhat is Cyber Threat IntelligenceInformation that an organization utilizes to understand the risks that have, will, or are presently attacking it is known as cyber threat…Dec 9, 2021Dec 9, 2021
Published inFAUN — Developer Community 🐾How to Protect Against Digital Risks in 3 stepAttack Surface AnalysisNov 23, 2021Nov 23, 2021
Published inAWS in Plain EnglishAWS DDoS MitigationAWS services for DDoS attack mitigation.Nov 6, 2021Nov 6, 2021
Published inAWS in Plain EnglishAWS Incident ResponseA look at the capabilities for investigation that are only possible if you’re using AWS.Nov 6, 2021Nov 6, 2021
Published inAWS in Plain EnglishAWS Data ProtectionHow does AWS provide data protection?Nov 6, 20211Nov 6, 20211