Cybersecurity is typically associated with protecting systems from attacks. While protection is important, it is not sufficient to concentrate our efforts on this goal alone.
This is part 2 of the blog article on JAMStack with architecture considerations and assessments of different scenarios. Part 1 of the article on benefits and players can be found here.
JAM - an abbreviation that allows many puns. But what is behind it?
Does this feel familiar? The user interface is out of date, the performance reminds more of a carriage instead of a hyperloop, the conversion rate is dropping year after year and the cool features have to give way to maintenance. Everyone knows it, no one is saying it. It's inevitable.
Data security is crucial, especially for personal data, to gain and maintain the trust of users. Efforts to ensure a high level of data security are enshrined in legislation as the General Data Protection Regulation (GDPR), which has been in force since May 2018.