>
Jan Jurek
About the authorJan Jurek
Senior Software Architect
A Senior Software Architect and Team Manager with almost 15 years’ experience, Jan has developed and managed projects using a wide array of tools and technologies, especially Java. Passionate about enhancing products and services for his clients, Jan leverages his engineering background and security expertise to ensure safe and swift software delivery. When not exploring the exciting possibilities of Kubernetes, AWS and Web Application Security, he can be found giving lectures to students at various Polish universities.
All posts by this author




Various authors
Why Companies Choose Hybrid Cloud and How They Keep It Secure
Published: 2025/02/20




Various authors
What is a Web Application Firewall (WAF)? Benefits, Functions and Best Practices
Published: 2023/08/31





Various authors
Service Mesh – A New, Safe Architecture to Enhance Your Microservices
Published: 2023/06/01





Various authors
The Best Cybersecurity Practices for Kubernetes Projects
Published: 2023/04/26


Jan Jurek
Which cyber security strategies does your company need in 2022 and beyond?
Published: 2022/06/23