May 19, 2023
An Introduction to Amazon Security Lake
In today's fast-paced digital world, cyber threats are on the rise exponentially and are a constant stress point for organisations. Remediating any security incidents require logs from different resources and…
May 19, 2023
Security metrics, an executive level view
The business opportunities provided by technology related innovation are immense but these opportunities are also accompanied by an ever increasing level of risk. How does the executive team obtain clarity…
May 17, 2023
Integrating Okta logs with Amazon Security Lake
In this post we’ll take you through the logical steps to configure Okta System logs conversion into parquet files in OCSF (Open Cybersecurity Schema Framework) format and storing them with…
April 28, 2023
Unpacking AI’s Next Moves: Web Directions AI 2023
A Front-Row Seat to AI's Evolution Last month, I had the unique opportunity to attend the Web Directions AI 2023 conference. Stepping into the venue, I was immediately enveloped by an electric…
April 27, 2023
GraphQL Part 1: Comparing Monolithic and Backend-for-Frontend (BFF) Architectures for Implementing GraphQL
Written by Mirjam Uher Background GraphQL is a powerful query language for APIs that was released in 2015. It has since gained a lot of attention for its schema-driven approach…
April 27, 2023
The Pro’s and Con’s of using AWS MSK Serverless
Written by Sinnappu Jeyakumaran Our team recently did a tech assessment on AWS MSK Serverless, which automatically scales compute and storage resources so you can stream and store Apache Kafka…