Cybersecurity

Differences Between AWS Route 53 Failover and AWS ELB LB

This post provides clarity over the differences between AWS R3 failover and ELB LB.

Differences between On-Prem Networking and Cloud Networking

This post discusses some of the major differences between on-prem data center networking and cloud networking.

Create VMs on Proxmox With Terraform

Create new VMs on Proxmox by using API and cloning from existing VM template. All code is in Terraform. Sample code is provided on github repo.

CASB Deployment

Cloud Access Security Broker (CASB) is considered a common solution to mitigate "shadow IT" and data exfiltration risks on many organization's journey to cloud.

What Is Zero Trust

This is the first post of a series that attempts to discuss Zero Trust in security from a conceptual and implementation perspective.

Explain Border Gateway Protocol in 5 Minutes

This post attempts to explain the Border Gateway Protocol in plain English: what it is; how it works at a high level and some of the threats from a security perspective.

IoT Security

IoT security is a relatively new area that presents its own unique challenges. This post discusses some of the security risks and possible solutions.

OWASP Top Ten

The OWASP Top 10 represents a broad consensus about the most common and critical security risks to web applications. It can be used as reference for web application security.

Diffie-Hellman Key Exchange in a Nutshell

DH key exchange is a critical component in virtually every PKI implementation. Having a working knowledge of what it is and how it works would help in understanding PKI as a whole.

Sign Client Certificate Using Self Signed CA Certificate

In a cluster setting where TLS mutual authentication is required, it's not uncommon to see client certificates signed by either self-signed root CA or private CA.