Remove Authorization Remove Benchmark Remove Blog Remove Evaluation
article thumbnail

How to Implement Threat Modeling in Your DevSecOps Process

Pure Storage

How to Implement Threat Modeling in Your DevSecOps Process by Pure Storage Blog This blog on threat modeling was co-authored by Dr. Ratinder Paul Singh Ahuja, CTO for Security and Networking, and Rajan Yadav , Director of Engineering, CNBU (Portworx), Pure Storage. What Are Authentication Bypass Attacks?

article thumbnail

Simplify Elastic Operations without Compromising Data Searchability Using FlashBlade

Pure Storage

This article originally appeared on Medium.com and is republished with permission from the author. The pipeline architecture evaluated here builds on my previously presented disaggregated log analytics pipeline , which includes a very similar disaggregation of Confluent Kafka with Tiered Storage. Configuring a Frozen Tier.