PinnedPublished inSystem WeaknessDPDP: From Buzzword to Reality: A Long-Term Practical Approach in IndiaThis won 2nd place in ISACA whitepaper contest.Sep 2, 2024Sep 2, 2024
Published inAWS TipAWS Cost Optimization: Getting the Most from IAM Access Analyzer’s Unused Access FeatureIn today’s “lets move to cloud world”, security and cost optimization go hand in hand. Once often-overlooked aspect of AWS cost management…2d ago12d ago1
Published inAWS TipEnhancing Resource-Level Permissions for Amazon EBS SnapshotsAs organizations scale their AWS infrastructure, managing permissions for EBS snapshot operations becomes complex. Amazon’s new…Apr 24Apr 24
Why You Need Automated Certificate Management for AWS Private CADigital certificates are essential for secure communications in modern businesses. They verify system identities and encrypt data. But…Apr 22Apr 22
Published inSystem WeaknessThe Time Bomb in Your Cloud: Why 99% of Your Access Permissions Are a Security NightmareThe Shocking Truth About Your Cloud SecurityApr 20Apr 20
Published inMr. Plan ₿ PublicationThe Human Shield: Why Your Best Cybersecurity Tool Isn’t a Tool at AllTHE DETOUR DILEMMAApr 18Apr 18
Published inMr. Plan ₿ PublicationNavigating Security in 2025: Key Trends and Planning ConsiderationsKey Trends and Planning Considerations for securityApr 16Apr 16
Published inAWS TipHow Amazon Bedrock Guardrails Enhances Enterprise AI Safety: A Practical GuideWith quick and fast adoption of AI , organizations face a critical challenge: how to securely use the power of large language models…Apr 91Apr 91
Published inWrite A CatalystUnderstanding the Dunning-Kruger EffectWhat Is the Dunning-Kruger Effect?Apr 9Apr 9
Published inSystem WeaknessResponding to the Oracle Cloud Breach: Essential StepsThe recent Oracle Cloud Infrastructure (OCI) breach has sent shock through the tech industry, affecting hundreds of organizations around…Apr 81Apr 81