PinnedIntroduction To AWS Cloud Security Chaos EngineeringAWS Cloud Security Chaos Engineering VS Adversary Simulation/EmulationMar 4Mar 4
Cryptography Through The Ages (Part 2)From Scytale to Quantum-Safe CryptographyJan 24, 2023Jan 24, 2023
AWS AppConfig ExtensionsAWS AppConfig for Quick, Secure, and Simple DeploymentDec 15, 2022Dec 15, 2022
Cryptography Through The Ages (Part 1)From Scytale to Quantum-Safe CryptographyDec 14, 2022Dec 14, 2022
What Are Sock Puppet AccountsI had this question a while back when I noticed that I have been interacting with a sock puppet account for years, I wondered what made it…Sep 8, 2022Sep 8, 2022
Secure by Design: How Can UX Protect Your DataHow can user experience design protect your dataSep 7, 2022Sep 7, 2022
How to pass the AWS Security Specialty exam?First, we need to know why would we want to be AWS Certified Security Specialists.Sep 5, 2022Sep 5, 2022
AWS security best practices for non-security professionalsFirst, we need to understand what makes a system secure.Sep 4, 2022Sep 4, 2022
Introduction to the MITRE ATT&CK FrameworkWhat is the MITRE ATT&CK Framework?Aug 19, 20222Aug 19, 20222