The DevOps Guide to WAF API Gateways Post date November 4, 2024 Post author By yayabobi Post categories In api, cybersecurity
OWASP Cheat Sheet for SDLC with Downloadable [XLS] Post date October 31, 2024 Post author By yayabobi Post categories In cybersecurity
6 Best Practices for Performing a Fraud Risk Assessment Post date October 29, 2024 Post author By yayabobi Post categories In compliance, cybersecurity, fraud
6 Use Cases for Low-Code Process Automation Post date October 6, 2024 Post author By yayabobi Post categories In Automation, development, devops
Top 8 Process Automation Solutions Post date September 16, 2024 Post author By yayabobi Post categories In Automation, devops, webdev
Top 10 Infrastructure as Code Tools Post date August 28, 2024 Post author By yayabobi Post categories In Automation, devops
IT Process Automation: What is it and How Does GenAI Impact it? Post date August 27, 2024 Post author By yayabobi Post categories In Automation, devops
7 Essential Tips for Improving Operational Efficiency in Healthcare Post date August 20, 2024 Post author By yayabobi Post categories In cybersecurity
Fraud Risk Assessment: 5 Essentials Every Plan Must Have Post date August 2, 2024 Post author By yayabobi Post categories In cybersecurity
How to Harden IaC Security with KICS Post date August 2, 2024 Post author By yayabobi Post categories In containers, cybersecurity, docker
10 Essential Steps for Web Application Security Testing Post date March 15, 2023 Post author By yayabobi Post categories In cybersecurity, devops, webdev
The Essential SDLC Security Checklist Post date October 17, 2022 Post author By yayabobi Post categories In cybersecurity, devops, programming
8 Best Content Security Policies for 2022 Post date April 10, 2022 Post author By yayabobi Post categories In devops, security, webdev
Kotlin vs Java: 10 Years In Post date July 28, 2021 Post author By yayabobi Post categories In android, java, Kotlin, programming