Securing the Cloud: A Hands-On Guide to Building a Robust Azure Infra with Real-World TechniquesIn today’s cloud-dependent landscape, safeguarding data, applications, and infrastructure is critical. In this project, I designed a…Oct 31Oct 31
Real-Time Continuous Monitoring with a SIEM Using the ELK StackIn today’s enterprise environment, real-time monitoring of security events is crucial to detecting and responding to threats promptly. A…Oct 18Oct 18
Understanding TOCTOU Vulnerability: A Timeless Security RiskTOCTOU, or “Time of Check to Time of Use,” is a well-known security vulnerability with roots dating back decades. Despite being old, it…Oct 15Oct 15
Using Custom Policy to block Private IPs in Public DNS : Why and How!When it comes to private IP addresses being exposed in public DNS records, it’s not necessarily an immediate security disaster depending on…Sep 20Sep 20
Helm Troubleshooting: Resolving ‘Another Operation in Progress’Helm, a robust tool for managing Kubernetes applications and resources, simplifies deployment and scaling processes. However, like any…Feb 28Feb 28
Azure ARM Templates: Navigating Limits and OptimizationHave you ever found yourself immersed in writing an Azure ARM Template, seemingly endless in creativity and complexity, only to be reminded…Feb 17Feb 17
Why SystemD over Sysvinit ?When it comes to choosing an init system for your Linux distribution, the debate often revolves around Sysvinit and SystemD. Both of these…Jan 281Jan 281
Best Terraform Practices : QuiUse Recommit Hook for Basic Terraform Formatting and LintingOct 6, 20231Oct 6, 20231
The Need for Speed: Why Cloudflare Ditched NGINX for PingoraCloudflare, a global leader in web security and performance, has recently made headlines by bidding farewell to the tried and tested NGINX…Sep 26, 2023Sep 26, 2023
Terraform Licensing Update: From MPL to BSLIn a landscape where technology never stands still, HashiCorp’s recent move has sent ripples through the open-source realm. The company has…Aug 21, 2023Aug 21, 2023