Articles by the author
List of articles:
What is API Gateway Security? – Interface security in microservices architecture
In a microservices architecture, hundreds of small, independent services form a complex ecosystem. Directly exposing them to the world would…
What are non-human identities (NHI)? – Managing machine identities
Your company has 1,000 employees, but 20,000 identities. How is that possible? The rest are apps, scripts, bots and devices…
Docker and Kubernetes container security: best practices for DevOps
Containerization has revolutionized DevOps, promising speed and flexibility. But this revolution has also created a new and complex world of…
Security of Low-Code/No-Code solutions: pitfalls of rapid application development
Low-Code/No-Code platforms have democratized application development, putting the power in the hands of business. But this revolution has its dark…
What is Secure SDLC? – Secure software lifecycle
In the traditional model, security was the brake – the team that said “stop” at the very end of the…
Cybersecurity certifications: Which ones really build value and competence in a team?
The cyber security certificate market is a jungle full of acronyms: CISSP, CISM, CEH, OSCP…. Investing in team development is…
SD-WAN security: How to protect the wide area network in the era of cloud and remote working?
The traditional WAN, based on expensive MPLS links and a central exit to the Internet, has not kept pace with…
KSC NIS2 from the technical side: An Implementation Guide for IT Professionals and Team Leaders
The KSC/NIS2 audit is ready and the board has approved the budget. Now it’s time to get to the real…
National Security and Cyber Resilience – How will PLN 20 billion from the NIP change Polish defense and implement NIS2?
Poland launches Security and Defense Fund – PLN 20 billion from KPO for defense and cyber resilience. While the media…
