
XDR vs SIEM
XDR versus SIEM When designing a security infrastructure, many acronyms need to be addressed, and it can be difficult to find a…

A Guide to HPC Storage in the Cloud
High performance computing (HPC) is an ever-evolving domain that strives to solve complex compute problems at the sub-millisecond level. The aim has…

Metlo API Security Platform
API security can be daunting, but we’re here to help. Introducing Metlo, the API Security Platform that helps you secure your API…

An Arm and a Bicep – Azure’s New DSL
Has ARM reached its peak of potential and is it now time to say hello Bicep? Over the past few years, we…

Tidying up your Mess
Cloud computing, a noticeable paradigm shift in the history of computing offers a very compelling value proposition. But this comes at a…

Can you keep a Secret? Secrets Management Done Right
Introduction Are you managing your secrets well or have you already been breached? Stolen credentials cause almost half of all data breaches…

SucculentPi Part 2: Hardware Failure; IKEA and Lambda to the Rescue
Previously on SucculentPi… In the last blog, we built an IoT panopticon to perform seriously overkill monitoring of an unfortunate house plant….

Tips and Tricks for Lift and Shift Migrations to AWS
What I wish I knew before I started doing lift and shift migrations to AWS In a previous blog post I’ve discussed…

Using Infrastructure as Code in Rehosting Migrations
Without a doubt, Infrastructure as Code together with DevOps and Migrations is one of the hottest topics in the last 5+ years…