Below you will find pages that utilize the taxonomy term “Cybersecurity”
Posts
Deploy a web app within 5 minutes
Learn how to deploy a demo Python 3 web application on Google Cloud AppEngine. AppEngine is a managed platform on Google Cloud that allows customers to quickly deploy a scalable application without provisoning infrastructure.
read more
Posts
Differences Between AWS Route 53 Failover and AWS ELB LB
This post provides clarity over the differences between AWS R3 failover and ELB LB.
read more
Posts
Differences between On-Prem Networking and Cloud Networking
This post discusses some of the major differences between on-prem data center networking and cloud networking.
read more
Posts
Create VMs on Proxmox With Terraform
Create new VMs on Proxmox by using API and cloning from existing VM template. All code is in Terraform. Sample code is provided on github repo.
read more
Posts
CASB Deployment
Cloud Access Security Broker (CASB) is considered a common solution to mitigate “shadow IT” and data exfiltration risks on many organization’s journey to cloud.
read more
Posts
What Is Zero Trust
This is the first post of a series that attempts to discuss Zero Trust in security from a conceptual and implementation perspective.
read more
Posts
Explain Border Gateway Protocol in 5 Minutes
This post attempts to explain the Border Gateway Protocol in plain English: what it is; how it works at a high level and some of the threats from a security perspective.
read more
Posts
IoT Security
IoT security is a relatively new area that presents its own unique challenges. This post discusses some of the security risks and possible solutions.
read more
Posts
OWASP Top Ten
The OWASP Top 10 represents a broad consensus about the most common and critical security risks to web applications. It can be used as reference for web application security.
read more
Posts
Diffie-Hellman Key Exchange in a Nutshell
DH key exchange is a critical component in virtually every PKI implementation. Having a working knowledge of what it is and how it works would help in understanding PKI as a whole.
read more
Posts
Sign Client Certificate Using Self Signed CA Certificate
In a cluster setting where TLS mutual authentication is required, it’s not uncommon to see client certificates signed by either self-signed root CA or private CA.
read more
Posts
Extract User Identity from AWS Cloudtrail
Whether you are troubleshooting or investigating something on AWS, being able to look up user identity across the Cloudtrail event logs can be very helpful.
read more
Posts
One Time Password, HOTP and TOTP
All you need to know about OTP from a security perspective.
read more
Posts
SSH and TLS: Differences and Similarities
Review the differences and similarities between the two protocols from an architecture and security perspective.
read more