Evan Morris

Known for his boundless energy and enthusiasm. Evan works as a Freelance Networking Analyst, an avid blog writer, particularly around technology, cybersecurity and forthcoming threats which can compromise sensitive data. With a vast experience of ethical hacking, Evan’s been able to express his views articulately.

cloud infrastructure management infrastructure-as-code IaC

Why Local Values Are Crucial to Cloud Infrastructure Management

Infrastructure-as-Code (IaC) has significantly improved the way organizations build and manage their cloud-based IT infrastructure. IaC allows organizations to put all provisioning, management, and maintenance settings into code for easier and faster deployment. This code can then be tweaked and

Why Local Values Are Crucial to Cloud Infrastructure Management Read More »

CIA triad confidentiality integrity availability

Balancing the CIA Triad: Addressing Trade-offs and Conflicting Priorities

CIA: These letters are often associated with the formidable United States spy agency. However, in cybersecurity, CIA refers to a triad of concepts that serve as the core building blocks in establishing effective security systems. These are confidentiality, integrity, and

Balancing the CIA Triad: Addressing Trade-offs and Conflicting Priorities Read More »

Scroll to Top