People first leadership

In today’s security landscape, the effectiveness of a cyber leader is defined not just by technical expertise but by their ability to support, empower, and protect their teams. By prioritizing a people first approach, these leaders create an environment where teams can focus on proactive defense, free from the hindrances Read more

VERIS

Introduction Accurate, structured incident data is essential for effective analysis, reporting, and response. VERIS (Vocabulary for Event Recording and Incident Sharing) provides a standardized approach to categorize security incidents, improving insights and facilitating data sharing. By utilizing VERIS, organizations can leverage it in ServiceNow to gain both strategic and tactical Read more

Transformer Series 1: Foundation

In 2017, the AI landscape for language understanding changed dramatically when Google Brain researchers introduced a groundbreaking algorithm called the “Transformer” in their paper “Attention is All You Need.” Before this, AI models could only process one word at a time, often resulting in awkward, incomplete language. The Transformer’s self-attention Read more

Setting Up Passkeys in AWS IAM

Passkeys offer a passwordless and more secure way to authenticate to AWS accounts, reducing risks associated with credential-based attacks like phishing and password stuffing. Passkeys rely on cryptographic keys linked to users’ devices, making traditional passwords obsolete. This guide outlines the setup for passkeys in AWS IAM. What Are Passkeys? Read more

Identity and Access Management

Identity and Access Management (IAM) is a critical cybersecurity frameworks which ensures that the right individuals and systems have appropriate access to an organization’s resources. In this post, I will break down IAM’s core concepts, explain its critical components, and provide technical examples of implementation. What is IAM? IAM refers Read more

A Touch of Kubernetes

Deploying applications on Kubernetes can initially seem complex. Using Helm, Kubernetes’ package manager, simplifies the deployment process by letting you define reusable configurations in a single chart. Here’s a breakdown of how Kubernetes and Helm work, and the practical steps we used to get this testing project up and running. Read more

A Touch of DevSecOps

Building a DevSecOps CI/CD Pipeline with Jenkins, SonarQube, and Snyk Using Terraform Introduction Incorporating security into Continuous Integration/Continuous Deployment (CI/CD) pipelines is a core DevSecOps practice. By leveraging tools like Jenkins, SonarQube, and Snyk, you can automate static and dependency vulnerability scans within your pipeline. This post will guide you Read more

A Touch of Ansible

Ansible simplifies IT automation by allowing you to configure, deploy, and manage infrastructure with straightforward YAML files. Here’s how we used Ansible to deploy Jenkins, SonarQube, and a sample application while automating repetitive tasks across our setup. We’ll also cover some powerful ways to extend Ansible’s capabilities. Table of Contents Read more