Content Hub.

Discover tech community

A guide to EC2 disaster recovery using Terraform
Discover step-by-step instructions to enhance your Terraform configuration for seamless restoration from snapshots in the secondary availability zone.

Efficient Custom AMI Workflow Using AWS Backup: A Practical Approach
Learn how to leverage automation and SSM documents to dynamically create and manage AMIs on demand

GKE Sys:All Loophole: Don’t let shared responsibility lull you into a false sense of security
A recent discovery by The Orca Research Pod named ‘Sys:All’ presents an impactful and widely spread vulnerability in Google Cloud Platform’s Kubernetes Engine.

Building an Event-Driven Architecture with EventBridge Pipes & Terraform: A Walkthrough Guide
In this blog, Yuliia describes how to implement Amazon EventBridge Pipes between DynamoDB Streams and EventBridge Event Bus using Terraform.

Navigating Your Application Modernisation Journey. A Case in Point: Platform and Software Modernisation.
In this blog, our experts discuss key considerations of modernising platform and software on cloud.

Streamlining Data Integration: Extracting Data from SAP with AWS AppFlow via VPC Peering
Discover key features, challenges, and a step-by-step guide to seamlessly integrate SAP data with AWS services for enhanced decision-making.

Migrating a Splunk Enterprise Environment to AWS: What to consider
Migrate Splunk to AWS seamlessly with these tips from an AWS expert. Explore key considerations for a seamless transition.

How to Leverage Amazon Amplify for Enhanced Authentication in React Apps
This post is an introduction on how to configure Amazon Amplify for a React Application and best practices to handle authentication and authorisation for users.

Modernising legacy monolithic applications
This blog explores the challenges of monolithic architectures, guiding developers toward adaptive, forward-thinking decisions.

10 steps to building Terragrunt orchestrator
Dive into efficient infrastructure automation with our step-by-step guide

Monitoring vs. Observability? Let’s think about driving cars
From Maps to Apps: See why the future is with observability in IT systems.

How to stand out as a candidate in the changing tech industry.
Some tips on how to stand out when applying to tech roles - from sending your CV, to making the right impression in interviews.

AWS Private Marketplace setup for organisations
Elevate AWS Cloud Efficiency: Discover AWS Private Marketplace – Your solution for secure, compliant purchases within organisations

Amazon DynamoDB table updates by an event driven AWS Lambda function in a multi-account environment
Automate AWS DynamoDB updates with Lambda triggered by EventBridge. Efficient resource management in cloud computing.

Who is your sysadmin at Home?
Let’s get the clickbait out of the way, the answer is You! and now the why and how and the rest of the story.

8 ways women and men behave differently when applying for an IT job in Europe
While doing my research I came across this survey from March 17, 2022, about female representation in ICT – information...

Google Cloud Authentication with Workload Identity Federation for GitHub Actions
With the Workload Identity Federation (WIF), you can grant external identities IAM roles, by allowing them to impersonate service accounts that have these roles.

Automating Terraform Deployments with GitHub Actions: A Step-by-Step Guide
In this article, you’ll learn how to use GitHub Actions to deploy your Terraform code to production in Google Cloud.

IBM Multicloud is now available as an event source in AWS CloudTrail Lake
Compliance and security are core principles of IBM Multicloud (formerly Nordcloud Klarity) and recent collaboration with AWS CloudTrail further improves...

Your Induction Questions, Answered
The Story Behind our Remote Inductions It’s probably no surprise that those of us working in cloud services are also...

Automated Production-Level Solution for Computer Vision Apps on the Edge Using AWS Panorama
We demonstrate how to use an AWS serverless architecture to deploy computer vision applications leveraging ML model predictions.

What are the advantages of SIEM?
Since security incident and event management (SIEM) offers obvious advantages, it has been widely embraced and utilised to manage cybersecurity...

Uber, Social Engineering & Security Weak Links | Expert Blog
I have talked a few times in these blogs about the importance of security and cloud teams keeping staff informed...

Top 10 Security Challenges of 2023
There are an estimated 213 million companies worldwide, and every year many more appear in the business world. Among so...