Network Configuration, Optimization, and Security Expert
Liku Zelleke is a field support technician at DXC Technology and a prolific blogger. He has over two decades’ experience in the IT industry starting at Ethiopian Airlines in 1997, holding a number of roles during his 25 years with the company from Helpdesk Tech Support through to Database Administrator, Systems Administrator, Network Administrator and a Systems Support Professional.
He hasn’t looked back since the day, years ago, when he discovered he could combine that experience with his other passion: writing. Today, he writes on topics related to network configuration, optimization, and security.
Static code analysis – also known as Static Application Security Testing or SAST – is the process of analyzing computer software without actually running the software. Find out which are the best tools for the job.
There are many ways of keeping a network secure. However, one aspect often taken lightly or even ignored is attacks by users behind the firewall. User and Entity Behavior Analytics (UEBA) will help you identify and combat such security issues.
CASB can be a software or hardware solution tasked with protecting data and identity. We take a look at some CASB solutions that can genuinely help protect data and networks.
The best way of maintaining the container security and integrity is by using the best container security tools. This is the best way to ensure that the enterprise solutions you deploy remain in place and function optimally.