PORTFOLIO
Published Blogs & Articles
How Not to Lose (Most of) Your Packets – Equinix
The Comprehensive Guide to Opera’s Privacy & Security Features and Settings – Fingerprint.com
Security Best Practices for Serverless Azure Functions – NetBird
The Comprehensive Guide to Edge’s Privacy & Security Features and Settings – Fingerprint
How the Different Data Platforms Differ – Equinix
Scalable Infrastructure for Complex News Websites – Hygraph
Comparing Sales Territory Mapping Software Options – Geopostcodes
What you need to know about Internet Protocol Security (IPsec) – Tailscale
What is a Lateral Movement Attack and How Do You Prevent It? – Tailscale
Replacing Shopify Plus with a Scalable E-Commerce Architecture – Fabric
5 Datadog alternatives to consider in 2023 – Airplane
Is GitHub Still Safe to Use? – Rewind
kubectl Cheat Sheet – Teleport
Identity Provider Needs For Gaming Or Esports – FusionAuth
What Is Identity Proofing? – FusionAuth
10 Benefits and Use Cases of a Data Warehouse – Panoply
Single Source vs. Multichannel vs. Omnichannel Publishing – Strapi
The Factors That Matter When Selecting an Online Video Player – Bitmovin
Everything You Need to Know About Content Modeling – Strapi
The Role of Code Coverage in Regulated Industries – Codecov
Understanding the Roles in Quality Assurance – Codecov
Top Twenty-Five Thought Leaders in Software Testing and Automation – Codecov
What Is Continuous Integration? – Earthly.dev
Data Technology
Disaster Recovery vs. Business Continuity – What’s the Difference?
What are the Advantages of Secondary Storage?
Top 3 Reasons Why Traditional Data Virtualization Does Not Work
What is MySQL High Availability?
What is Software-Defined Networking?
Why Your Backup Strategy Should Include Air-Gapping?
6 Ways Data Can Drive Down Costs
How Does Data Power Modern Video Games?
The Data Protection Benefits of Modern Apps?
What are Data Ethics and How Can Storage Improve Ethics Best Practices?
Cybersecurity
5 Use Cases for SIEM (Security Information & Event Management)
Fighting Cyberattacks – 5 Ways Healthcare Organizations Can Protect Their Data
How to Perform a Network Security Audit
How to Prepare for a Security Event: The Tech and Team You Need
Top Things to Consider When Performing Cybersecurity Health Checks
Topics You Should Include In Cybersecurity Awareness Training
What is Endpoint Security Why it’s Important and How it Works?
Why Security as a Service Just Makes Sense
How the Pandemic is Changing Cybersecurity Risks
What Common Vulnerabilities Cause Ransomware Attacks?
Anatomy of a Ransomware Attack
Is Browser Fingerprinting Legal? Understanding GDPR and Asking for Consent
10 Benefits of Managed Cloud Services
Advantages Of A Virtualized Data Center
Benefits and Disadvantages of Maintaining a Hybrid Cloud Environment
How Cloud Innovation is Enabling Business Growth
How Does Virtualization Work in Cloud Computing?
Top 5 Benefits of Cloud Automation Services
Top 7 Things You Need to Know About Hybrid Cloud