Big DataSec: A Checklist for Securing Data Lakes

Big DataSec: A Checklist for Securing Data Lakes

Big DataSec: A Checklist for Securing Data Lakes MAY, 2023 by Andrew Walker   Author Andrew Walker Andrew Walker is a software architect with 10+ years of experience. Andrew is passionate about his craft, and he loves using his skills to design enterprise...
Implementing DevSecOps in your SDLC

Implementing DevSecOps in your SDLC

Implementing DevSecOps in your SDLC MAY, 2023 by Andrew Walker.   Author Andrew Walker Andrew Walker is a software architect with 10+ years of experience. Andrew is passionate about his craft, and he loves using his skills to design enterprise solutions for...
Big Data File Formats Untangled

Big Data File Formats Untangled

Big Data File Formats Untangled FEB, 2023 by Jane Temov.   Author Jane Temov Jane Temov is an IT Environments Evangelist at Enov8, specializing in IT and Test Environment Management, Test Data Management, Data Security, Disaster Recovery, Release Management,...
Software Security Anti-Patterns

Software Security Anti-Patterns

Software Security Anti-Patterns NOV, 2022 by Eric Boersma *Original OCT 2019   Author Eric Boersma This post was written by Eric Boersma. Eric is a software developer and development manager who’s done everything from IT security in pharmaceuticals to...