Information Security

CASB Deployment

Cloud Access Security Broker (CASB) is considered a common solution to mitigate "shadow IT" and data exfiltration risks on many organization's journey to cloud.

What Is Zero Trust

This is the first post of a series that attempts to discuss Zero Trust in security from a conceptual and implementation perspective.

Explain Border Gateway Protocol in 5 Minutes

This post attempts to explain the Border Gateway Protocol in plain English: what it is; how it works at a high level and some of the threats from a security perspective.

IoT Security

IoT security is a relatively new area that presents its own unique challenges. This post discusses some of the security risks and possible solutions.

Extract User Identity from AWS Cloudtrail

Whether you are troubleshooting or investigating something on AWS, being able to look up user identity across the Cloudtrail event logs can be very helpful.

One Time Password, HOTP and TOTP

All you need to know about OTP from a security perspective.

SSH and TLS: Differences and Similarities

Review the differences and similarities between the two protocols from an architecture and security perspective.

TLS Handshake in a Nutshell

A quick overview of TLS handshake