Logging and Monitoring in Software Security

Why we need it?

--

--

--

Passionate Technical Lead, Senior Software Developer and free and open source software advocate. Based in Singapore.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Making biometrics secure

COVID-19, Telehealth and why identity matters

Syringe Floating Near Person’s Hand [Daniel Frank]

Binance in Talks With UAE Regulators for Potential HQ

TikTok Theft of Personal Data for Profit

Imagining the Metaverse

Trends in Cybersecurity to Watch

{UPDATE} Aeon Wars: Galactic Conquest Hack Free Resources Generator

Decentralized identifiers as a defensive instrument

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ishan Liyanage

Ishan Liyanage

Passionate Technical Lead, Senior Software Developer and free and open source software advocate. Based in Singapore.

More from Medium

What is Tekton?

Application Performance Monitoring: Monitor dynamically java applications with Consul, Prometheus…

Continuous Deployment in Client-Server Architecture

Spring Cloud Gateway with logs