★
Check Out The Security Blog
★ Check Out The Security Blog
Let me introduce myself
I previously built and led secure design functions at Insight, secured and protected thousands of websites per day at SiteLock alongside malware research at Sectigo, and am currently building and scaling security for millions of rental cars at Turo.
-
November 2024
- Nov 10, 2024 Methods for bypassing Multi-Factor Authentication (MFA) Nov 10, 2024
-
August 2024
- Aug 26, 2024 OAuth 2.0 authentication vulnerabilities and remediations Aug 26, 2024
- Aug 12, 2024 Strategies to secure containerized environments Aug 12, 2024
-
July 2024
- Jul 22, 2024 Summary of the Global Crowdstrike-Microsoft Outage Jul 22, 2024
-
May 2024
- May 27, 2024 How I passed the eWPT exam? May 27, 2024
-
January 2024
- Jan 1, 2024 Elevating Security Projects to New Heights with the power of Diataxis. Jan 1, 2024
-
November 2023
- Nov 1, 2023 What are Passkeys, and how do they work? Nov 1, 2023
-
October 2023
- Oct 4, 2023 What is a Race Condition Vulnerability? Oct 4, 2023
-
July 2023
- Jul 3, 2023 Securing Infrastructure as Code for AWS Jul 3, 2023
-
May 2023
- May 31, 2023 How to build an effective security awareness training program? May 31, 2023
-
March 2023
- Mar 29, 2023 How I passed the AWS Security Specialty? Mar 29, 2023
- Mar 15, 2023 Stateful v/s Stateless Connections in AWS VPCs Mar 15, 2023
-
February 2023
- Feb 22, 2023 Choosing the Right Load Balancer for Your AWS Application: between CLB, ALB, and NLB Feb 22, 2023
-
January 2023
- Jan 25, 2023 Securing Your Data in AWS using AWS Key Management Service (KMS) Jan 25, 2023
- Jan 5, 2023 What is Javascript Prototype Pollution? Jan 5, 2023
-
December 2022
- Dec 22, 2022 How does Amazon Simple Storage Service (S3) work? Dec 22, 2022
- Dec 7, 2022 The difference between DynamoDb, RDS, Redshift and Aurora Database Dec 7, 2022
-
November 2022
- Nov 23, 2022 How to create and scope out an Incident Response Plan? Nov 23, 2022
- Nov 9, 2022 How to effectively scope out your vulnerability assessment & scanning? Nov 9, 2022
-
October 2022
- Oct 26, 2022 Email security monitoring best practices Oct 26, 2022
- Oct 12, 2022 What is Http Strict Transport Security (HSTS)? Oct 12, 2022
-
September 2022
- Sep 28, 2022 The Uber data breach summary Sep 28, 2022
- Sep 13, 2022 How can one exploit a CORS policy? Sep 13, 2022
-
August 2022
- Aug 30, 2022 How I passed my Comptia CySa+? Aug 30, 2022
- Aug 16, 2022 Serverless Architecture vs Function as a Service [FaaS] Aug 16, 2022
- Aug 2, 2022 What makes a process seem suspicious? Aug 2, 2022
-
July 2022
- Jul 20, 2022 Why is a bug-bounty program important for a company? Jul 20, 2022
- Jul 6, 2022 How can I help you with your Security Journey? Jul 6, 2022
-
June 2022
- Jun 22, 2022 What is SOAP Security? Jun 22, 2022
- Jun 8, 2022 How to prevent a Cache Poisoning DoS Attack? Jun 8, 2022
-
May 2022
- May 25, 2022 How to secure your AWS CloudTrail? May 25, 2022
- May 11, 2022 How can you exploit a JWT token? May 11, 2022
-
April 2022
- Apr 27, 2022 Blue-Green vs Canary Deployments Apr 27, 2022
- Apr 13, 2022 What is a Zero-Trust Architecture? Apr 13, 2022
-
March 2022
- Mar 30, 2022 Should you Shift-Left or Shift-Right? Mar 30, 2022
- Mar 16, 2022 Streamline your SDLC during SOC2 audits to make them effortless Mar 16, 2022
- Mar 2, 2022 Delegated authorization v/s Federated identity Mar 2, 2022
-
February 2022
- Feb 23, 2022 Automate your infrastructure with Terraform Feb 23, 2022
- Feb 2, 2022 How can Kubernetes help you? Feb 2, 2022
-
January 2022
- Jan 25, 2022 What is malware beaconing? Jan 25, 2022
- Jan 13, 2022 Why do you need a SOAR to improve your security team's performance? Jan 13, 2022
- Jan 5, 2022 Basics of working with Git Jan 5, 2022
-
December 2021
- Dec 22, 2021 Basics of Identity and Access Management Dec 22, 2021
- Dec 14, 2021 Zero-Day Exploits: Log4J Dec 14, 2021
- Dec 8, 2021 Can the metaVerse be cyberattacked? Dec 8, 2021
-
November 2021
- Nov 24, 2021 What are API Vulnerabilities? Nov 24, 2021
- Nov 10, 2021 What is Subnetting? Nov 10, 2021
-
October 2021
- Oct 27, 2021 What is Security By Design? Oct 27, 2021
- Oct 13, 2021 How does HTTP work? Oct 13, 2021
-
September 2021
- Sep 29, 2021 Why is cybersecurity so hard? Sep 29, 2021
- Sep 13, 2021 What is a NoSQL Injection Attack? Sep 13, 2021
-
August 2021
- Aug 31, 2021 Hack The Box Edition: Curling Aug 31, 2021
- Aug 16, 2021 What is the General Data Protection Regulation? Aug 16, 2021
- Aug 2, 2021 VulnHub Edition: DerpNStink Aug 2, 2021
-
July 2021
- Jul 28, 2021 Hack The Box Edition: Teacher Jul 28, 2021
- Jul 19, 2021 Cyber attacks you need to know about. Jul 19, 2021
- Jul 14, 2021 The Revil Ransomware - “Kaseya” Jul 14, 2021
- Jul 5, 2021 What is a Security Program Management? Jul 5, 2021
-
June 2021
- Jun 30, 2021 Has automation become a big part of cybersecurity? Jun 30, 2021
- Jun 23, 2021 Use a VPN to keep your data safe! Jun 23, 2021
- Jun 14, 2021 Should online privacy be a necessity or an option? Jun 14, 2021
-
May 2021
- May 31, 2021 How to secure a content management system? May 31, 2021
- May 26, 2021 What is the Metasploit Framework and how is it used? May 26, 2021
- May 17, 2021 What is Dogecoin? May 17, 2021
- May 12, 2021 What is a Buffer OverFlow Attack? May 12, 2021
- May 9, 2021 What is Privilege Escalation? May 9, 2021
- May 3, 2021 Why is Threat Modeling important? May 3, 2021
-
April 2021
- Apr 26, 2021 What is Web Application Security? Apr 26, 2021
- Apr 19, 2021 Authentication vs Authorization vs Accounting Apr 19, 2021
- Apr 12, 2021 What is a Ransomware Attack? Apr 12, 2021
- Apr 10, 2021 What are the perils of Unrestricted File Uploads? Apr 10, 2021
- Apr 5, 2021 Why Regular Expressions are a game changer! Apr 5, 2021
-
March 2021
- Mar 29, 2021 How does malware affect your website and how can you remove it? Mar 29, 2021
- Mar 22, 2021 What is a Social Engineering Attack? Mar 22, 2021
- Mar 15, 2021 Vulnerability Scanning vs Penetration Testing. What’s the difference? Mar 15, 2021
- Mar 8, 2021 What is Ethereum? Mar 8, 2021
- Mar 1, 2021 Why you need a Raspberry Pi Now! Mar 1, 2021
-
February 2021
- Feb 22, 2021 What is Cryptocurrency ? Feb 22, 2021
- Feb 15, 2021 How to protect your system from hackers and cyber attacks? Feb 15, 2021
- Feb 8, 2021 What you need to know about the SolarWinds Hack. Feb 8, 2021
- Feb 3, 2021 Want to get into Cybersecurity? Feb 3, 2021