Remove Architecture Remove Authentication Remove Authorization Remove Blog
article thumbnail

Cybersecurity Month 2023: Doing Our Part to #SecureOurWorld

Pure Storage

Cybersecurity Month 2023: Doing Our Part to #SecureOurWorld by Pure Storage Blog The 20th Cybersecurity Awareness Month is upon us, and it’s the ideal time to build next-gen resilience into your critical infrastructure now while preparing for the cyber challenges of tomorrow. Is Your Enterprise IT Architecture Resilient and Ready?

article thumbnail

How to Implement Threat Modeling in Your DevSecOps Process

Pure Storage

How to Implement Threat Modeling in Your DevSecOps Process by Pure Storage Blog This blog on threat modeling was co-authored by Dr. Ratinder Paul Singh Ahuja, CTO for Security and Networking, and Rajan Yadav , Director of Engineering, CNBU (Portworx), Pure Storage. What Are Authentication Bypass Attacks?

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

World Backup Day: Four Data Protection Best Practices to Know

Pure Storage

World Backup Day: Four Data Protection Best Practices to Know by Pure Storage Blog This article originally appeared on SolutionsReview.com. It has been republished with permission from the author. Tiered backup architectures use different logical and geographic locations to meet diverse backup and recovery needs.

Backup 96
article thumbnail

What is Zero Trust Architecture?

Pure Storage

What is Zero Trust Architecture? Why Is Zero Trust Architecture So Important Today? How a Zero Trust Architecture Is Implemented A zero trust architecture (ZTA) is not a catchall in cybersecurity, but it is a vast improvement on traditional network security techniques. In today’s landscape, trust should never be assumed.

article thumbnail

Field Notes: Protecting Domain-Joined Workloads with CloudEndure Disaster Recovery

AWS Disaster Recovery

Co-authored by Daniel Covey, Solutions Architect, at CloudEndure, an AWS Company and Luis Molina, Senior Cloud Architect at AWS. In this blog, we go through some of the options for IT professionals who are using the CloudEndure Disaster Recovery (DR) tool , and how to best architect it in certain scenarios. Overview of architecture.

article thumbnail

DevOps for Databricks: Databricks Rest API & Python

Advancing Analytics

In this blog series I explore a variety of options available for DevOps for Databricks. This blog will focus on working with the Databricks REST API & Python. So, this blog is for those 45% Python Developers wanting to use Python to fulfil their DevOps needs. Why you ask?

article thumbnail

What is Zero Trust Architecture?

Pure Storage

What is Zero Trust Architecture? Why Is Zero Trust Architecture So Important Today? How a Zero Trust Architecture Is Implemented A zero trust architecture (ZTA) is not a catchall in cybersecurity, but it is a vast improvement on traditional network security techniques. In today’s landscape, trust should never be assumed.