Aymen AbdelwahedinuleapKubernetes Security — Chaos Loves You — Litmus ChaosChaos Engineering has grown massively as a technology, and its community adoption has gone viral. But what is it about? Added values?Sep 30Sep 30
Aymen AbdelwahedinuleapAzure Data Lake Storage — ACLs for enhanced securityAccess Control Lists (ACLs) in ADLS provide fine-grained, scalable security for managing data access on Dir/File level.Aug 19Aug 19
Aymen AbdelwahedinuleapMicrosoft Fabric — A different Posture! — Part 1Azure’s data analytics approach is drifting from PaaS to SaaS: In a two-minute reading, what challenges does this offering resolve, and …Jul 29Jul 29
Aymen AbdelwahedinuleapAzure Application Security Groups — The Bicep!As we steer through the design, implementation, and security hardening of an Azure network infrastructure, we often confront challenges…Jul 17Jul 17
Aymen AbdelwahedinuleapAzure Application Security Groups — In a nutshellYou are probably familiar with network security groups (aka. NSGs), but you also realize their limitations and challenges in managing…Jul 17Jul 17
Aymen AbdelwahedinuleapGit Pre-Commit — Part 2 — The FrameworkToday’s article will mainly focus on the pre-commit open-source framework for managing and maintaining multi-language pre-commit hooks.Nov 10, 20231Nov 10, 20231
Aymen AbdelwahedinuleapSynapse Serverless Spark — Bicep Approach!Bicep approach and best practices in managing Synapse Spark Pools — Azure Synapse Analytics.Mar 27, 2023Mar 27, 2023
Aymen AbdelwahedinuleapKubeCost — For better cost efficiencyCloud changed the Dynamics; Engineers are spending more money with code while having less visibility and low predictability on Finance…Mar 4, 2023Mar 4, 2023
Aymen AbdelwahedinuleapGit Pre-Commit — Part 1 — Zero Trust My Code!In today’s article, will be chitchatting about the “Git pre-commit” and the “Pre-Commit framework”. One can use these tools to keep the…Nov 13, 2023Nov 13, 2023
Aymen AbdelwahedinuleapFalco — Security at Runtime for KubernetesWhen we think about cyber threats, we think about potential attacks from the outside. However, a major threat is hugely exploited by…May 9, 2022May 9, 2022