Echoes of Intrusion: 2024’s Cyber Breaches and Future SafeguardsAs the sun set in 2024, I was intrigued by recalling my experience observing a series of cyber attacks that fundamentally challenged trust…Jan 2Jan 2
Enterprise Systems and Cloud SecurityFor many large and medium sized companies SAP systems are business critical and are faced with incredible challenging tasks to protect…Dec 2, 2020Dec 2, 2020
Growing imperative of Vulnerability ManagementA continuous daunting task for the growing digital enterprise is to manage the vulnerabilities and the risks associated with it. Many…Nov 13, 2020Nov 13, 2020
Cloud Vision vs Clouded VisionThere’s a sharp difference in the statement. One having the vision to adopt cloud and others having a hazy clouded vision for the same…Jun 10, 2020Jun 10, 2020
Running for an Event …Last summer I spent considerable time preparing for an event. It may easily suggest this is referring to a Half or Full Marathon. In this…May 29, 2020May 29, 2020
Develop Operate S…Exploring various views and take on the Dev Ops and it is more often correlated to the ability to have faster deployments and reduced lead…May 18, 2020May 18, 2020