Exploring Devbox from Jetify: The Ultimate Development Environment ToolDevbox is a command-line tool that lets you easily create isolated shells for development.Dec 19, 2024Dec 19, 2024
APIM with EntraID using App rolesAPI Authentication with API Management (APIM) using APIM Policies with Entra ID and App RolesDec 4, 2024Dec 4, 2024
Seamlessly Integrate Azure OpenAI with EntraID: A Guide to Using Azure SDK and Interactive Browser…Learn to integrate Azure OpenAI with EntraID using Azure SDK and Interactive Browser Credential.Oct 18, 2024Oct 18, 2024
LOW Code /No Code Threats and mitigationsThis guide explains what the major security threats are for these applications, the difficulties they pose, and how to deal with them.May 14, 2024May 14, 2024
How to Access Amazon S3 Buckets from Your VPC or On-Premises NetworkHow to Access Amazon S3 Buckets from Your VPC or On-Premises NetworkSep 28, 2023Sep 28, 2023
How to use Fine-grained access control in Amazon OpenSearch ServiceHow to use Fine-grained access control in Amazon OpenSearch ServiceSep 27, 2023Sep 27, 2023
How to use SAML authentication with AzureAD for Amazon OpenSearch Service and OpenSearch ServerlessIn this blog post, I will show you how to use SAML authentication with AzureAD for Amazon OpenSearch Service and OpenSearch Serverless…Sep 27, 20232Sep 27, 20232
How to Secure Blockchains from Attacks: A Security Reference Architecture for Distributed Ledger…By systematizing our knowledge about blockchain security and providing a structured approach to risk assessment, it can help stakeholdersAug 2, 2023Aug 2, 2023
Threat ModelingThreat modeling is a structured way to identify and mitigate security risks in your software projects. It helps you to think like an…Jul 29, 2023Jul 29, 2023
Nudge TheorySo, when economists make their models, they generally assume that people are rational and predictable. But When we look at actual human…Jul 29, 2023Jul 29, 2023