Blog

Blog Posts
April 23, 2024
The Key Factor Behind TablePlus's DDoS Resiliency

TablePlus published a blog post on how they did nothing to handle a DDoS attack. Their blog post titled “We are under DDoS attack and we do nothing” - published at the end of March 2024 - caught my eye when it quickly reached the top of Hacker News.

February 26, 2024
Ultimate Guide to Fail at Least Privilege in Cloud (and the Hard Lessons I Learned)

Least privilege is a defense-in-depth strategy that everyone talks about. While I first heard it a few years back this seemed to be a magical solution to a good number of security issues I faced.

January 23, 2024
Kickstarting in Cybersecurity: Strategic Advice for 2nd and 3rd Year Indian College Students

How to get started in cybersecurity?

This is the first question I get from many students attending Null Bangalore meetups, security conferences, and more.

September 13, 2023
Beyond the Basics: AWS WAF's Lesser-Known Limitations

AWS WAF service is an L7 firewall service offered by AWS. It’s easy to set up, seamlessly integrates with other AWS services (ALB, API Gateway, etc.), and comes with a handful of managed WAF rulesets and rate limit features.

June 27, 2023
My Key Takeaways from AWS re:Inforce 2023

The much-awaited AWS re:Inforce 2023 videos have finally landed on YouTube. You can now pick your favorite track and watch the sessions at your own pace here - https://www.youtube.com/@AWSEventsChannel/playlists?view=50&sort=dd&shelf_id=2.

May 11, 2023
The Risk You Can't Afford to Ignore: AWS SES and Email Spoofing

AWS SES is used in multiple ways - automated reminders, marketing emails, security automation & alerts, etc. There’s a risk with the domain verified on SES; often overlooked. A risk that falls at the intersection of Cloud and Enterprise risk.

Previous 1 2 3 4