Sedat SALMANVirtual Patching for Cybersecurity: Protecting Vulnerable Systems on Azure PlatformIn the world of cybersecurity, vulnerabilities can pose a significant risk to businesses. It is essential to patch any vulnerabilities in a…4 min read·Mar 16, 2023----
Sedat SALMANHow to Become a Solution Architect #1: SkillsetAs a matter of fact, the story of a solution architect has similarities with the story of “The Architect," which we are familiar with from…6 min read·Jan 15, 2023----
Sedat SALMANExplain with 5 examples: XSSCross-Site Scripting (XSS) is a type of vulnerability that allows an attacker to inject malicious code into a website. This code is then…3 min read·Jan 9, 2023----
Sedat SALMAN(Encyclopedia of Cybersecurity Standards) Chapter #1: Introduction(Encyclopedia of Cybersecurity Standards) Chapter #1: Introduction17 min read·Dec 27, 2022----
Sedat SALMANinAWS TipAWS IoT Stories #03: MQTT ProtocolMQTT (Message Queuing Telemetry Transport) is a lightweight messaging protocol designed for communication between devices in low-bandwidth…4 min read·Dec 23, 2022----
Sedat SALMANinAWS TipAWS IoT Stories #02: Free RTOSWe all use general-purpose-operating systems such as Windows, Linux, and macOS in our daily life and for work. However, when it comes to…5 min read·Dec 13, 2022----
Sedat SALMANinAWS TipAWS IoT Stories #01: Purdue Model and SegmentationCloud computing, in its simplest definition, can be defined as the ability to use computing services over the internet at any time. With…4 min read·Sep 22, 2022----
Sedat SALMANinAWS TipAWS IaC Stories #01: IntroductionA DevOps technique called Infrastructure as a Code (IaC), often known as programmable infrastructure.2 min read·Sep 15, 2022----
Sedat SALMANinAWS TipAWS Security Tips #03: CIS Controls FrameworkThe CIS (Center for Internet Security) is a non profit organization and its main purpose to form security policies, decisions by supplying…5 min read·May 25, 2022----