DEV Community

Ikoh Sylva profile picture

Ikoh Sylva

I'm a Mobile and African Tech Enthusiast with a large focus on Cloud Technology (AWS)

Education

B.sc. Electronics and Computer Technology. University of Calabar, Cross River. Nigeria

Work

Technical Support Specialist at Shivtech Limited

End-to-End Encryption for Healthcare Workloads

End-to-End Encryption for Healthcare Workloads

3
Comments
6 min read

Want to connect with Ikoh Sylva?

Create an account to connect with Ikoh Sylva. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
Securing Containers with Amazon ECS/EKS

Securing Containers with Amazon ECS/EKS

9
Comments
6 min read
AWS Firewall Manager Policies Enhancing Cloud Security at Scale

AWS Firewall Manager Policies Enhancing Cloud Security at Scale

3
Comments
7 min read
Building a Secure CI/CD Pipeline on AWS

Building a Secure CI/CD Pipeline on AWS

4
Comments
7 min read
Automating AWS Security with Code a Comprehensive Guide

Automating AWS Security with Code a Comprehensive Guide

7
Comments
5 min read
AWS Penetration Testing Guidelines Safeguarding Your Cloud Environment

AWS Penetration Testing Guidelines Safeguarding Your Cloud Environment

7
Comments 2
7 min read
Encryption and Key Management Strategies for Financial Workloads

Encryption and Key Management Strategies for Financial Workloads

10
Comments
6 min read
AWS Security Blogs and Whitepapers, Your Guide to Cloud Security Knowledge

AWS Security Blogs and Whitepapers, Your Guide to Cloud Security Knowledge

8
Comments
6 min read
AWS Security Benchmarking, Ensuring Robust Cloud Security

AWS Security Benchmarking, Ensuring Robust Cloud Security

7
Comments
6 min read
AWS Control Tower for Multi-Account Security

AWS Control Tower for Multi-Account Security

7
Comments
6 min read
AWS CloudHSM for Key Storage; Securing Your Cryptographic Keys in the Cloud

AWS CloudHSM for Key Storage; Securing Your Cryptographic Keys in the Cloud

7
Comments
6 min read
Secure Software Development on AWS

Secure Software Development on AWS

8
Comments
6 min read
Managing Healthcare Data Lifecycles with AWS Security Services

Managing Healthcare Data Lifecycles with AWS Security Services

5
Comments
8 min read
AWS Trusted Advisor for Security Checks

AWS Trusted Advisor for Security Checks

9
Comments
7 min read
AWS Systems Manager Patch Manager

AWS Systems Manager Patch Manager

7
Comments
7 min read
AWS Security Automation with Lambda

AWS Security Automation with Lambda

8
Comments
7 min read
AWS Artifact for Security Compliance Reports

AWS Artifact for Security Compliance Reports

7
Comments
7 min read
AWS Security Groups for EC2 Instances: A Comprehensive Guide

AWS Security Groups for EC2 Instances: A Comprehensive Guide

8
Comments
6 min read
Using AWS CloudHSM for FIPS 140-2 Validated Key Storage in Financial Services

Using AWS CloudHSM for FIPS 140-2 Validated Key Storage in Financial Services

7
Comments
6 min read
AWS Firewall Manager: Comprehensive Security Management for Your Cloud Infrastructure

AWS Firewall Manager: Comprehensive Security Management for Your Cloud Infrastructure

10
Comments
5 min read
AWS Cognito for User Authentication: A Comprehensive Guide

AWS Cognito for User Authentication: A Comprehensive Guide

7
Comments
5 min read
Securing AWS Lambda Functions Best Practices and Strategies

Securing AWS Lambda Functions Best Practices and Strategies

5
Comments
6 min read
Infrastructure as Code Security with CloudFormation

Infrastructure as Code Security with CloudFormation

9
Comments
6 min read
Boost Your DevOps Security: Comprehensive AWS Strategies for Safe Cloud Operations

Boost Your DevOps Security: Comprehensive AWS Strategies for Safe Cloud Operations

5
Comments
5 min read
Securing Protected Health Information (PHI) on AWS: Best Practices and Strategies

Securing Protected Health Information (PHI) on AWS: Best Practices and Strategies

9
Comments
6 min read
AWS Security Incident Response: Navigating Threats in the Cloud

AWS Security Incident Response: Navigating Threats in the Cloud

5
Comments
5 min read
Enhancing Cybersecurity with AWS WAF Security Automations

Enhancing Cybersecurity with AWS WAF Security Automations

12
Comments 2
5 min read
Simplifying SSL/TLS Management with AWS Certificate Manager

Simplifying SSL/TLS Management with AWS Certificate Manager

6
Comments
6 min read
Securing Core Banking Applications on AWS: Best Practices for Protecting Sensitive Financial Data

Securing Core Banking Applications on AWS: Best Practices for Protecting Sensitive Financial Data

11
Comments
6 min read
Unlocking Security in the Cloud: Your Ultimate Guide to Secure Secrets Management in the Cloud

Unlocking Security in the Cloud: Your Ultimate Guide to Secure Secrets Management in the Cloud

11
Comments
5 min read
Mastering AWS Key Management Service (KMS) for Robust Data Security

Mastering AWS Key Management Service (KMS) for Robust Data Security

9
Comments
7 min read
Unlocking the Power of Secure Data Storage with Amazon EBS Encryption

Unlocking the Power of Secure Data Storage with Amazon EBS Encryption

6
Comments
7 min read
Safeguarding Your Data: Best Practices for Securing Amazon S3 Buckets

Safeguarding Your Data: Best Practices for Securing Amazon S3 Buckets

6
Comments
7 min read
Connecting Your Enterprise to the Cloud: Exploring AWS VPN and AWS Direct Connect

Connecting Your Enterprise to the Cloud: Exploring AWS VPN and AWS Direct Connect

6
Comments
8 min read
Architecting HIPAA Compliant Solutions on AWS: Safeguarding Healthcare Data in the Cloud

Architecting HIPAA Compliant Solutions on AWS: Safeguarding Healthcare Data in the Cloud

5
Comments
8 min read
Unlocking Private Connectivity in the Cloud Era: Exploring the Power of AWS PrivateLink

Unlocking Private Connectivity in the Cloud Era: Exploring the Power of AWS PrivateLink

3
Comments
5 min read
Unlocking Ironclad AWS Security: Mastering Network ACLs and Security Groups

Unlocking Ironclad AWS Security: Mastering Network ACLs and Security Groups

5
Comments
6 min read
Bulletproof Your Cloud with Amazon VPC: Unmatched Security for Your Virtual Network

Bulletproof Your Cloud with Amazon VPC: Unmatched Security for Your Virtual Network

5
Comments
7 min read
Fortify Your Cloud with Unbreakable DDoS Protection: Unleash the Power of AWS Shield

Fortify Your Cloud with Unbreakable DDoS Protection: Unleash the Power of AWS Shield

5
Comments
7 min read
Fortress Supreme: Unleashing the Ultimate Web Application Guardian with AWS WAF

Fortress Supreme: Unleashing the Ultimate Web Application Guardian with AWS WAF

5
Comments
10 min read
Fortifying the Citadel: Mastering PCI-DSS Compliance on AWS for Uncompromising Payment Card Data Security

Fortifying the Citadel: Mastering PCI-DSS Compliance on AWS for Uncompromising Payment Card Data Security

5
Comments
8 min read
Unleashing the Sentinel's Might: Mastering Centralized Security with AWS Security Hub – Your Cloud Fortress Guardian

Unleashing the Sentinel's Might: Mastering Centralized Security with AWS Security Hub – Your Cloud Fortress Guardian

5
Comments
10 min read
Unveiling AWS Inspector: The Unstoppable Cyber Sentinel - Mastering Vulnerability Assessment with Cloud Omniscience

Unveiling AWS Inspector: The Unstoppable Cyber Sentinel - Mastering Vulnerability Assessment with Cloud Omniscience

5
Comments
9 min read
AWS GuardDuty: The Unstoppable Sentinel - Mastering Cloud Threat Detection with AI-Powered Vigilance

AWS GuardDuty: The Unstoppable Sentinel - Mastering Cloud Threat Detection with AI-Powered Vigilance

5
Comments
10 min read
Unleashing the Power of AWS Config: The Ultimate Architect for Cloud Resource Configuration Management

Unleashing the Power of AWS Config: The Ultimate Architect for Cloud Resource Configuration Management

5
Comments
9 min read
Mastering AWS CloudTrail: The Omniscient Eye for Auditing and Logging Supremacy

Mastering AWS CloudTrail: The Omniscient Eye for Auditing and Logging Supremacy

4
Comments
6 min read
Deep Dive: Fortifying Your Cloud Defences with AWS Multi-Factor Authentication (MFA)

Deep Dive: Fortifying Your Cloud Defences with AWS Multi-Factor Authentication (MFA)

6
Comments
6 min read
Forging Impenetrable AWS Identities: Safeguarding the Root User and IAM Users

Forging Impenetrable AWS Identities: Safeguarding the Root User and IAM Users

5
Comments
7 min read
Securing the Kingdom: IAM Best Practices for AWS Cloud Castle

Securing the Kingdom: IAM Best Practices for AWS Cloud Castle

5
Comments
4 min read
Fortifying Your Cloud Fortress: A Comprehensive Guide to AWS Cloud Security

Fortifying Your Cloud Fortress: A Comprehensive Guide to AWS Cloud Security

7
Comments
6 min read
Navigating Information Overload: A Beginner's Guide to Starting Your Cloud Engineering Journey

Navigating Information Overload: A Beginner's Guide to Starting Your Cloud Engineering Journey

5
Comments
10 min read
loading...