Select Page
Blog Posts

Discover what’s trending in Technology & Culture.

Enforcing Security Practices with AWS Config

Enforcing Security Practices with AWS Config

AWS Config provides a detailed view of your AWS resources, allowing you to see their configuration, relationships, and historical changes. This helps you understand how your resources are interrelated and how they've evolved, promoting better management and...

read more
Config in DevOps

Config in DevOps

In the ever-evolving world of cloud computing, DevOps teams grapple with managing complex infrastructure while maintaining consistency, compliance, and security. AWS Config emerges as a game-changer, offering a centralized platform to streamline operations, enforce...

read more
Cloudformation guard

Cloudformation guard

Policy as Code automates enforcement and implementation via the policy to find out logical inconsistencies , syntax error, missing dependencies before they go into the Infrastructure Provisioning process through the IAC. They act as guardrails and are proven to be...

read more
Cyber Security in Nepal

Cyber Security in Nepal

In today's interconnected world, where information flows seamlessly across borders and technology permeates every aspect of life, cybersecurity serves as an essential shield against emerging threats. Nestled in the heart of South Asia, Nepal is rapidly embracing...

read more