AWS WAF: A Practical Scenario and Solution
Written By Bikash Yadav
Dec 24, 2024
an experienced System and Cloud Engineer, who has honed expertise in designing, implementing, and maintaining intricate on-premise and cloud IT infrastructure. My journey has led me to evolve into a skilled DevOps Engineer, where I specialize in crafting secure, scalable, and available systems and cloud infrastructures.
Latest Blogs
Recent Developments in AWS : January 2025
AWS started 2025 with a host of significant updates aimed at improving security, streamlining multi-...
Saugat Tiwari
Feb 03, 2025
Automated File Backup with Azure Function and Terraform
A 2025 report from The Business Research Company predicts that the backup and recovery mar...
Sujata Dahal
Jan 29, 2025
Achieving Policy as Code with Kyverno in Kubernetes
Kubernetes environments thrive on flexibility and scalability, but these benefits also present chall...
Mukesh Awasthi
Jan 27, 2025
Understanding the STRIDE Threat Model: A Comprehensive Example for Enhanced System Security
The STRIDE Threat Model systematically identifies and mitigates potential security risks within soft...
Prabin Singh Thakuri
Jan 24, 2025
Budgeting for DevOps Outsourcing: Cost Analysis In 2025
According to Gartner reports, 80% of organizations will implement DevOps by 2027 to streamline...
Prabin Singh Thakuri
Jan 22, 2025
Ensuring Data Security in Outsourced DevOps: A Guide for Business Leaders
DevOps outsourcing has emerged as a game-changing strategy for organisations aiming to streamline op...
Prabin Singh Thakuri
Jan 21, 2025
What Are Merge Conflicts and How to Resolve Merge Conflicts in Azure DevOps?
Did you know that according to Atlassian's State of Developer Experience Report 2024, around 69% of...
Prabin Singh Thakuri
Jan 20, 2025
Setting up AWS Managed Microsoft AD: Step-By-Step Guide
In Part 1 of our three-part blog series, "Connecting Your On-Premises Network to AWS," we ...
Nischal Gautam
Jan 16, 2025
Layer 2 Attacks and Mitigation Techniques: DHCP Snooping for Network Protection
Layer 2 attacks, which target the OSI model's data connection layer, pose significant dangers to loc...
Milan Dangol
Jan 09, 2025
Streamlining ELK Stack Deployment on Kubernetes with Helm Charts
ELK Stack (Elasticsearch, Logstash, Kibana) is a log aggregation, storage, and visualization toolkit...
Mukesh Awasthi
Jan 08, 2025