MKKPRO

Category Archives: Cloud Security

  • Published On: 05/08/2023 Author: MKK

    Confused selecting a right detection & response solution? It takes patience, expertise, money, and effort to detect and respond to a problem. Take a look at this article to...

  • Published On: 14/05/2023 Author: MKK

    How do we choose which EDR tool to use? Endpoint attacks are getting more common and smarter, and the number of people working remotely has gone up recently. This...

  • Published On: 23/03/2023 Author: MKK

    Everywhere I go for security consultations, this is the most frequently asked question, therefore I decided to write an article on this subject.

  • Published On: 12/03/2023 Author: MKK

    What is the significance of CNAPP? Before get into CNAPP, lets understand what exactly is cloud-native cyber security? The term “cloud-native cyber security” refers to a collection of different...

  • Published On: 11/02/2023 Author: MKK

    Best Practices for Cloud Security This cloud security article outlines the problems that companies face today, as well as best practises for securing and managing cloud-native products and tools,...

  • Published On: 29/01/2023 Author: MKK

    AI in Security Domain In recent years, artificial intelligence (AI) has emerged as a game-changing technology with vast applications. Artificial intelligence has had a major effect in the field...

  • Published On: 24/10/2022 Author: MKK

    Security Acceptance Criteria Existing user stories will typically include acceptance criteria in the form of security requirements more frequently. Examples are provided in the following. Application Architecture and Design...

  • Published On: 24/08/2022 Author: MKK

    Modern Cloud Security Services: A Guide   Mission-critical functions have been outsourced to cloud service providers (CSPs) due to the growing prevalence of cloud computing among enterprises. The majority...

  • Published On: 15/07/2022 Author: MKK

    Deter Data Breach and Protect Application   Day by day more & more applications along with data move to the cloud.  On the other side cloud data breach hitting the...

You cannot copy content of this page