Cloud Access Security Broker (CASB) is considered a common solution to mitigate "shadow IT" and data exfiltration risks on many organization's journey to cloud.
This is the first post of a series that attempts to discuss Zero Trust in security from a conceptual and implementation perspective.
This post attempts to explain the Border Gateway Protocol in plain English: what it is; how it works at a high level and some of the threats from a security perspective.
IoT security is a relatively new area that presents its own unique challenges. This post discusses some of the security risks and possible solutions.
Whether you are troubleshooting or investigating something on AWS, being able to look up user identity across the Cloudtrail event logs can be very helpful.
All you need to know about OTP from a security perspective.
Review the differences and similarities between the two protocols from an architecture and security perspective.
A quick overview of TLS handshake