DevSecOps: Integrating Security into DevOps – Part 3

Continuing from my previous blog, let’s explore some more advanced topics related to DevSecOps implementation. Shift-Left Testing One of the key concepts in DevSecOps is shift-left testing. This means shifting security testing as far left in the software development process as possible. This helps identify security issues early in the development process, which is much […]

Read more โ†’

The Architecture Decision That Will Make or Break Your System: Monolith vs Microservices in 2025

The debate between monolithic and microservices architectures has evolved significantly over the past decade. What was once a straightforward “microservices are better” narrative has matured into a nuanced understanding that the right architecture depends entirely on context. After leading architecture decisions across dozens of enterprise systems, I’ve learned that the most expensive mistakes come not […]

Read more โ†’

DevSecOps: Integrating Security into DevOps โ€“ Part 4

In this continuation blog, we will explore some more advanced topics related to DevSecOps implementation. Threat Modeling Threat modeling is the process of identifying potential threats to an application or system and evaluating their impact. It helps identify potential security vulnerabilities and prioritize security activities. The following steps are involved in the threat modeling process: […]

Read more โ†’

DevSecOps: Integrating Security into DevOps โ€“ Part 5

Continuing from my previous blog, let’s explore some more advanced topics related to DevSecOps implementation. Identity and Access Management Identity and Access Management (IAM) is a critical aspect of DevSecOps. It involves managing user identities and controlling their access to resources based on their roles and responsibilities. IAM includes the following activities: Infrastructure as Code […]

Read more โ†’

FHIR Integration Best Practices: Lessons from Production

Executive Summary FHIR (Fast Healthcare Interoperability Resources) has become the de facto standard for healthcare data exchange. This article shares production-tested best practices from implementing FHIR integrations across multiple EMR systems, processing 50M+ API calls monthly. ๐Ÿฅ HEALTHCARE INTEROPERABILITY SERIES This article is part of a comprehensive series on healthcare data standards and interoperability. HL7 […]

Read more โ†’

DevSecOps: Integrating Security into DevOps โ€“ Part 6

Continuing from my previous blog, let’s explore some more advanced topics related to DevSecOps implementation. Threat Intelligence Threat intelligence is the process of gathering information about potential threats and vulnerabilities to an organization’s systems and applications. It involves collecting, analyzing, and disseminating information about potential threats, vulnerabilities, and threat actors. Threat intelligence includes the following […]

Read more โ†’