Most tech conference freebies like badges, stickers, and branded items are useless clutter after the event. It's time conferences let attendees opt out of swag. …
How the security threat modeling mindset of constantly asking 'what can go wrong?' seeped into my personal life, creating subtle pessimism, and how I broke the cycle. …
How TablePlus survived a DDoS attack at zero cost by using Cloudflare R2 instead of AWS S3. The same attack on AWS would have cost $650+ in bandwidth charges. …
Real-world mistakes and hard lessons from implementing least privilege in cloud, from treating it as binary to lacking rollback mechanisms in automation. …
Practical career advice for Indian college students breaking into cybersecurity, covering domains, first roles, networking, coding skills, and choosing the right company. …
Lesser-known AWS WAF limitations from production experience: 8 KB body inspection limit, inflexible rate-limiting, sensitive header logging, and more. …
Key takeaways from AWS re:Inforce 2023, covering zero trust, data security, incident response, and new launches like CodeGuru Security, Security Lake, and Bedrock. …
Verifying a domain in AWS SES lets any IAM user with SES permissions spoof emails from any address on that domain. Here's the risk and how to fix it. …
A year of production experience with Cloud Custodian. Its strengths in real-time detection and auto-remediation, and its pain points in docs and multi-account setup. …
GitHub Dependabot lacks a central dashboard for prioritizing alerts across repos. Here's how to build one with GraphQL API, Postgres, and Apache Superset. …