Posts
    
OWASP Top Ten
      The OWASP Top 10 represents a broad consensus about the most common and critical security risks to web applications. It can be used as reference for web application security.
    
    read more
  
    Posts
    
Diffie-Hellman Key Exchange in a Nutshell
      DH key exchange is a critical component in virtually every PKI implementation. Having a working knowledge of what it is and how it works would help in understanding PKI as a whole.
    
    read more
  
    Posts
    
Sign Client Certificate Using Self Signed CA Certificate
      In a cluster setting where TLS mutual authentication is required, it’s not uncommon to see client certificates signed by either self-signed root CA or private CA.
    
    read more
  
    Posts
    
Python3 CheatSheet
      This post is my collection of python3 code snippets including string and list manipulation.
    
    read more
  
    Posts
    
Audit User Actions Using CloudTrail - Part 2
      This is the second post of a series that demonstrates how to leverage AWS CloudTrail in auditing user actions. This post is focused on cross account access.
    
    read more