Posts

Audit User Actions Using CloudTrail - Part 1

read more
Posts

Extract User Identity from AWS Cloudtrail

read more
Posts

One Time Password, HOTP and TOTP

read more
Posts

Threat Modeling and STRIDE Model

read more
Posts

SSH and TLS: Differences and Similarities

read more