5 Telemetry Types in Security Threat Monitoring On Google Cloud PlatformJaliesha is responsible for cybersecurity within the DevOps team at her cloud-native software service company — they call it DevSecOps…Feb 4, 2023Feb 4, 2023
DDoS Attack Detected? How To Prevent It?I have been consulting a company and their marketing website (+20M unique monthly visitors). This level of exposure comes with a great risk…Jan 27, 2023Jan 27, 2023
Published inThe Security ChefImproving AWS Security posture: Key learning from the State of AWS Security studyIntroductionJan 26, 2023Jan 26, 2023
Configure access to the EC2 Serial Console of an unreachable or inaccessible Linux instanceYou might have come across a situation where your Amazon Elastic Compute Cloud (Amazon EC2) Linux instance is unreachable or inaccessible…Jan 21, 2023Jan 21, 2023
Region Locking On AWSAWS originally enabled all new AWS Regions by default, which enabled your users to create resources in any Region. Now, when AWS adds a…Jan 15, 2023Jan 15, 2023
Published inThe Security ChefPerforming Audit On Your AWS KMS Cryptographic KeysIn this article, we are going to learn how to work with AWS monitoring services to control and understand the usage, state, and…Jan 8, 2023Jan 8, 2023
Its a good idea to have a separate compliance AWS account (Similar to Security tooling and Log…Thanks for sharing!Jan 8, 2023Jan 8, 2023
Published inThe Security ChefAdvanced Access Control Mechanisms Using AWS KMSAWS Key Management Service (AWS KMS) is a managed service that makes it easy for you to create and control the cryptographic keys that are…Dec 13, 2022Dec 13, 2022
Published inThe Security ChefNTP Amplification Attack: What it is and How to Mitigate?Those of you who don’t know about NTP, Let’s first understand what NTP is and how it can be used by hacker to perform DDoS attack on the…Dec 13, 2022Dec 13, 2022
Published inThe Security ChefSecure API Gateway From DDoS/DoS Attack Impacts In AWSAs you all know, Amazon API Gateway is a fully-managed service that enables developers to create, publish, maintain, monitor, and secure…Dec 1, 2022Dec 1, 2022