Skip to content
Friday, September 22, 2023

TFun dot org

Information Security newsfeeds from around the world in English and French. Find it all in one place since 2004. You'll find online the last 5 years.

  • Security
  • Malware
  • Vulnerabilities
  • Hacking
  • cybercrime
  • Attack Maps
  • Privacy Policy
  • Live map

Category: Trend Micro DevOps : Azure

Azure vs. AWS Developer Tools Guide

12/09/2023RedOne

Azure vs. AWS — which should you use for your DevOps environment? Discover the differences, similarities, and use cases to make an informed decision.

Continue Reading

How to Build a Simple Application Powered by ChatGPT

15/08/2023RedOne

OpenAI’s ChatGPT API enables applications to access and integrate ChatGPT, a large language model (LLM) that generates human-like responses to input. Learn how to build a web application that utilizes ChatGPT to generate useful output.

Continue Reading

Leverage the AWS Sustainability Pillar to Minimize Environmental Impact

08/08/2023RedOne

One of the key pillars of the AWS Well-Architected Framework (WAF) is sustainability: the idea that cloud applications should be designed to minimize their environmental impact. Gain insight into the WAF sustainability pillar and discover best practices for architecting your cloud applications to improve sustainability.

Continue Reading

AWS Reliability Pillar: Consistent Cloud Architecture

19/07/2023RedOne

Gain insight into the Reliability pillar of the AWS Well-Architected Framework and best practices for cloud-based operations, including change management and disaster recovery.

Continue Reading

How to Implement a Secure API Gateway

22/06/2023RedOne

As you rely more on APIs to connect microservices in modern applications, these APIs become a lucrative target for bad actors. Learn how an API gateway provides an extra layer of security, helping protect your systems and data from unauthorized access.

Continue Reading

Guide to Serverless Architecture Design Patterns

08/06/2023RedOne

Discover the power of serverless architecture design patterns for scalable and efficient application development. Explore EDA, pub-sub, fan-out/fan-in, strangler, and saga patterns. Learn how to select, implement, and optimize them for your needs.

Continue Reading

SSL vs. TLS: Which should you be using?

27/04/2023RedOne

You may wonder if you should choose SSL or TLS to secure your network. Explore the differences between the two communications protocols, use cases where you should choose one or the other, and best practices for using SSL and TLS.

Continue Reading

Top 5 Infrastructure as Code Security Challenges

20/04/2023RedOne

Learn how to counteract the top five challenges of infrastructure as code (IaC) and discover how these obstacles pose a threat to security and gain valuable insight in how to mitigate these risks.

Continue Reading

Dependency Mapping for DevSecOps

25/01/2023RedOne

Discover the importance of dependency mapping and best practices for successful dependency management

Continue Reading

TLS Connection Cryptographic Protocol Vulnerabilities

20/01/2023RedOne

TLS is the backbone of encryption and key to ensuring data integrity, but its misconfiguration can leave your system vulnerable. Read on to discover how to secure your TLS connection and arm your organization against malicious attacks.

Continue Reading

Posts navigation

Older posts
Tfun News | Theme: News Headline by CodeVibrant.
  • Security
  • Malware
  • Vulnerabilities
  • Hacking
  • cybercrime
  • Attack Maps
  • Privacy Policy
  • Live map