References Simulating Site-to-Site VPN Customer Gateways Using strongSwan AWS Site-to-Site VPN with IPSec VPN (Strongwan) and BGP (FRRouting) Building a Scalable and Secure Multi-VPC AWS Network Infrastructure
If you like to add some vintage like retro game feeling to your website, try use pixel art images might be a good idea. Here’s a quick howto.
This post provides clarity over the differences between AWS R3 failover and ELB LB.
This post discusses some of the major differences between on-prem data center networking and cloud networking.
Create new VMs on Proxmox by using API and cloning from existing VM template. All code is in Terraform. Sample code is provided on github repo.
Over the past few months I’ve collected a few good resources regarding Kubernetes security. I will add more as I learn. Reference Securing a Cluster This document covers topics related to protecting a cluster from accidental or malicious access and provides recommendations on overall security.
Cloud Access Security Broker (CASB) is considered a common solution to mitigate “shadow IT” and data exfiltration risks on many organization’s journey to cloud.
This is the first post of a series that attempts to discuss Zero Trust in security from a conceptual and implementation perspective.
This post attempts to explain the Border Gateway Protocol in plain English: what it is; how it works at a high level and some of the threats from a security perspective.
IoT security is a relatively new area that presents its own unique challenges. This post discusses some of the security risks and possible solutions.