Published inSystem WeaknessKubernetes Architecture Demystified: Part-02Introduction:Dec 16, 2024Dec 16, 2024
mTLS for Multi-Cloud Security: Secure Communication and Threat Modeling Between AWS and GCPIntroduction:Dec 1, 2024Dec 1, 2024
Secure AWS-to-GCP Integration: A Threat Modeling and Mitigation GuideIntroduction:Nov 28, 2024Nov 28, 2024
Introduction to Kubernetes and Security in the Cloud-Native Era: Part-01IntroductionNov 24, 2024Nov 24, 2024
Authentik vs Keycloak: Choosing the Right Open-Source IAM Tool: Part-02Introduction:Nov 18, 2024Nov 18, 2024
SAML (Security Assertion Markup Language) vs OpenID Connect (OIDC)vs OAuth 2.0: Part-011. SAML (Security Assertion Markup Language)Sep 7, 2024Sep 7, 2024
Automating Vulnerability Management with GCP Security Command Center and DefectDojo -Part 02Introduction:Aug 3, 2024Aug 3, 2024
Automating Vulnerability Management with GCP Security Command Center and DefectDojo: Part-01IntroductionJul 11, 2024Jul 11, 2024
Detecting and Mitigating CVE-2024–6387 in GCP Instances: Part:01In today’s rapidly evolving threat landscape, staying ahead of vulnerabilities is critical to maintaining the security of your systems…Jul 6, 2024Jul 6, 2024
Identity Aware Proxy for Securing GCP Applications: Part-03Enabling Identity-Aware Proxy (IAP) for Existing GKE InfrastructureJun 15, 2024Jun 15, 2024