April 19, 2023

Working at a Failed Startup

March 27, 2023

AWS Amplify versus Firebase for startups & MVPs

March 24, 2023

ChatGPT and the Future of Software Development Process

September 27, 2021

ISG Named to the 2021 Inc. 5000 List

May 14, 2021

Bridging the Tech-talent Gap and Shortage

April 13, 2021

Test Pyramid, a Discussion and a Practical example

February 23, 2021

Refined Approach to User Management and Authentication

February 17, 2021

Value Stream Optimization Explained

January 29, 2021

Agile Engineering Analytics

January 28, 2021

From DevOps + Security to DevSecOps – Executive Perspective

January 28, 2021

Infrastructure as Code Introduction

January 20, 2021

The Art of the possible with Quality.

October 16, 2020

Serverless FAQ

October 16, 2020

Have We Hit the DevSecOps Tipping Point?

August 27, 2020

Blockchain Encryption – Explained

July 20, 2020

How to Choose the Right Security Tools?

July 9, 2020

Top 5 Hacks

June 30, 2020

AWS – Security Services Rundown

June 19, 2020

AWS – Amazon Web Services

June 10, 2020

Cloud Services versus Physical Services

June 1, 2020

Everyone is Hackable

May 28, 2020

Is Your Mobile Device Secure?

May 26, 2020

Defense In Depth

May 22, 2020

Why in 2020 Does Our Work Force Still Fall Victim to Phishing Emails?!!

May 20, 2020

Ransomware

May 14, 2020

Mobile Devices

May 12, 2020

Why Are Old Operating Systems so Dangerous?

May 6, 2020

Why You Cannot Wait on Finishing your Information Security Policies

April 17, 2020

What does the AWS Shared Responsibility Model mean?

April 16, 2020

Managing Remote Workers