Logging and Monitoring in Software Security

Why we need it?

--

--

--

Passionate Technical Lead, Senior Software Developer and free and open source software advocate. Based in Singapore.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Best Practices For Data Privacy in Digital Marketing: How to Protect Customer Data?

We cannot no communicate

Cryptography Behind Bitcoin Wallet

Hacker News 駭客新聞文摘 2021–1–18

PeerPiper: Introducing a Next-Gen Web3 Keychain + Storage Scheme

{UPDATE} Motocross Trial Challenge Hack Free Resources Generator

{UPDATE} Car Speed Excited 3D Hack Free Resources Generator

The $MILKY Snapshot data is IN 🕹️🪐

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Ishan Liyanage

Ishan Liyanage

Passionate Technical Lead, Senior Software Developer and free and open source software advocate. Based in Singapore.

More from Medium

RazorOps Speeding up the deployment of microservices with Kubernetes!

Microservices and K8S: Antipatterns

In the business perspective: what are the benefits and drawbacks of adopting Kubernetes?

Reflections on IAM and Keycloak