Open in app

Sign In

Write

Sign In

Oguzhan Ozturk
Oguzhan Ozturk

143 Followers

Home

About

Jun 13

How API works?

An API, or Application Programming Interface, is a software intermediary that allows two applications to talk to each other. In other words, an API is the messenger that delivers your request to the provider that you’re requesting it from and then delivers the response back to you. APIs are used…

API

5 min read

How API works?
How API works?
API

5 min read


Apr 5, 2022

NoSQL Database — Introduction to MongoDB

NoSQL Database — We now live in a data-driven culture, and this is the era of Big Data. The 3-V’s, or vast volume, high velocity, and diversity of data, are used to define big data. Unstructured or semi-structured data accounts for 90% of all data generated. Traditional RDBMS is unsuitable…

Mongodb

3 min read

NoSQL Database — Introduction to MongoDB
NoSQL Database — Introduction to MongoDB
Mongodb

3 min read


Apr 5, 2022

AWS RDS Databases — Detailed Look at Relational Database Service

AWS RDS Databases — (Amazon Relational Database Service) is a web service that makes it easy to set up, administer, and scale a relational database in the Amazon Web Services Cloud. AWS RDS Databases performs basic database administration duties while providing cost-effective, resizable capacity for an industry-standard relational database. RDS…

AWS

3 min read

AWS RDS Databases — Detailed Look at Relational Database Service
AWS RDS Databases — Detailed Look at Relational Database Service
AWS

3 min read


Published in

CodeX

·Mar 9, 2022

What is third-party risk management?

Third-party risk management (TPRM) is a type of risk management that focuses on identifying and mitigating risks associated with the usage of third-party vendors (sometimes referred to as vendors, suppliers, partners, contractors, or service providers). Third-party risk management helps businesses to monitor and analyze the risk posed by third parties…

Osint

5 min read

Osint

5 min read


Published in

CodeX

·Mar 9, 2022

What is BYOD (Bring Your Own Device) Policy

BYOD, or Bring Your Own Device, is a growing trend in which employees use their personal devices for work. Companies that implement BYOD policies allow employees to use their own computers, smartphones, and tablets for work-related reasons rather than requiring them to utilize company-owned and managed devices. The concept has…

Byod

3 min read

What is BYOD (Bring Your Own Device) Policy
What is BYOD (Bring Your Own Device) Policy
Byod

3 min read


Published in

CodeX

·Dec 9, 2021

What is Cyber Threat Intelligence

Information that an organization utilizes to understand the risks that have, will, or are presently attacking it is known as cyber threat intelligence. This information is used to predict, prevent, and identify cyber threats attempting to exploit valuable resources. To prevent threats, Threat Intelligence enables organizations to make faster, more…

Threat

4 min read

What is Cyber Threat Intelligence
What is Cyber Threat Intelligence
Threat

4 min read


Published in

FAUN — Developer Community 🐾

·Nov 23, 2021

How to Protect Against Digital Risks in 3 step

Attack Surface Analysis The attack surface of a software environment is the sum of all the distinct locations (called “attack vectors”) where an unauthorized user (called an “attacker”) can try to enter or extract data from the environment. A basic security measure is to keep the attack surface as minimal as possible. Attack…

3 min read

3 min read


Published in

AWS in Plain English

·Nov 6, 2021

AWS DDoS Mitigation

Protection at the Edge A combination of AWS services may be used to implement a defense in depth strategy when it comes to DDoS attacks. These services are designed with an automatic response to DDoS attacks and can help minimize time to mitigate and reduce impact. AWS Edge locations provide an additional layer of…

Cloud Computing

3 min read

AWS DDoS Mitigation
AWS DDoS Mitigation
Cloud Computing

3 min read


Published in

AWS in Plain English

·Nov 6, 2021

AWS Incident Response

There are obvious differences between environments built to run in the cloud and environments running on-premises. When it comes to incident response, the same can be said. Incident response in the AWS Cloud is faster, cheaper, more effective, and simpler to manage. Your ability to detect, react, and recover can…

Cloud

3 min read

AWS Incident Response
AWS Incident Response
Cloud

3 min read


Published in

AWS in Plain English

·Nov 6, 2021

AWS Data Protection

Protection at Rest Protecting data at rest involves encrypting data while using one of the AWS services, including the AWS database services. When it comes to Amazon S3, for example, there are two types of encryption options available:

Cloud Security

3 min read

AWS Data Protection
AWS Data Protection
Cloud Security

3 min read

Oguzhan Ozturk

Oguzhan Ozturk

143 Followers

https://www.linkedin.com/in/oguzhanoz7urk/

Following
  • Sam Writes Security

    Sam Writes Security

  • Ruining All My Branding

    Ruining All My Branding

  • Ufukcan Eski

    Ufukcan Eski

  • Mina Mehtap Ayana

    Mina Mehtap Ayana

  • Bahadirsahin

    Bahadirsahin

See all (18)

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech

Teams