<img src="https://ws.zoominfo.com/pixel/JHVDdRXH2uangmUMQBZd" width="1" height="1" style="display: none;">

Tutorials, best practices, expert insights, and industry news on cloud security and compliance - all in one place.

      Sort by:
        Steve Mash

        Steve Mash

        Steve is a freelance technology writer with over thirty years of experience as a cybersecurity and systems assurance consultant. A certified ISO/IEC 27001 Lead Auditor and Member of the Institution of Engineering and Technology, Steve specializes in producing content around information technology, cybersecurity, and high integrity systems.

        Recent Posts

        How Toil Can be Avoided with Policy-as-Code

        Find out how codifying policies can reduce toil with the added benefit of improved security, efficiency, and flexibility.

        Read Time 6 mins read
        Manage Technical Debt by Codifying policies in the SDLC

        Find out how codifying policies and standards can enhance quality in an organization’s DevOps processes and what benefits this brings to managing technical debt.

        Read Time 6 mins read
        DevSecOps Threat Modeling
        Building A DevSecOps Culture with Threat Modeling

        Find out how Threat Modeling can help build an effective DevSecOps culture within an organization and what benefits this brings to product development.

        Read Time 5 mins read
        Policy-as-Code to Manage Zero Trust Architecture

        Find out how Policy-as-Code can help you manage your adoption of Zero Trust Architecture in a cloud environment securely and painlessly.

        Read Time 5 mins read
        Create A CI/CD Pipeline With Kubernetes And Jenkins

        What Does CI/CD Try To Solve? CI/CD is a term that is often heard alongside other terms like DevOps,

        Min Read 018 mins read
        Deploying Kubernetes With Kafka: Best Practices

        Kafka Kafka is an open-source event streaming platform first developed by LinkedIn, then donated to the

        Min Read 08 mins read
        Monitoring Kubernetes Clusters Through Prometheus & Grafana

        Monitoring is vital whether it is web application databases or kubernetes clusters. It’s about knowing

        Min Read 08 mins read
        Kubernetes StatefulSets 101 - State Of The Pods


        Min Read 09 mins read
        DevOps Kubernetes side car
        The Sidecar Pattern

        Do One Thing, Do it Best The basic idea on which UNIX was designed is to not have a complex monolithic

        Min Read 05 mins read
        Kubernetes And Databases

        Kubernetes is a major, modern improvement in development, and databases are an essential part of the

        Min Read 08 mins read
        Kubernetes and Containers Best Practices - Health Probes

        What Is The Health Probe Pattern? When you’re designing a mission-critical, highly-available application,

        Min Read 08 mins read
        Nodejs App From Docker To Kubernetes Cluster

        In this article, we’re developing a starter NodeJS server and deploying it to a Kubernetes cluster,

        Min Read 011 mins read
        How to Deploy a React App to a Kubernetes Cluster

        Kubernetes is a gold standard in the industry for deploying containerized applications in the cloud. Many

        Min Read 011 mins read
        Implementing A Reverse Proxy Server In Kubernetes Using The Sidecar

        What Is A Sidecar? A sidecar refers to a seat attached to the bicycle or motorbike so that they run on

        Min Read 08 mins read
        Kubernetes Observability: Log Aggregation Using ELK Stack

        Logging In The Cloud-Native Age In the old days, all components of your infrastructure were well-defined

        Min Read 019 mins read
        Deploying An Application On Kubernetes From A to Z

        We’ve all been there. You learned the basics of Kubernetes, Pods, ReplicaSets, Deployments, Services, etc.

        Min Read 019 mins read