This post provides clarity over the differences between AWS R3 failover and ELB LB.
This post discusses some of the major differences between on-prem data center networking and cloud networking.
Create new VMs on Proxmox by using API and cloning from existing VM template. All code is in Terraform. Sample code is provided on github repo.
Cloud Access Security Broker (CASB) is considered a common solution to mitigate "shadow IT" and data exfiltration risks on many organization's journey to cloud.
This is the first post of a series that attempts to discuss Zero Trust in security from a conceptual and implementation perspective.
This post attempts to explain the Border Gateway Protocol in plain English: what it is; how it works at a high level and some of the threats from a security perspective.
IoT security is a relatively new area that presents its own unique challenges. This post discusses some of the security risks and possible solutions.
The OWASP Top 10 represents a broad consensus about the most common and critical security risks to web applications. It can be used as reference for web application security.
DH key exchange is a critical component in virtually every PKI implementation. Having a working knowledge of what it is and how it works would help in understanding PKI as a whole.
In a cluster setting where TLS mutual authentication is required, it's not uncommon to see client certificates signed by either self-signed root CA or private CA.