PinnedPublished inAWS TipAutomating the weekly audit of publicly accessible S3 buckets.This tutorial on my blogMar 24Mar 24
Cloud Security and Defense insights: Defending Against the GUI-vil Threat ActorThis guide on my blog4d ago4d ago
Published inAWS TipDetect CVEs in Built Images Using Trivy and GitLab CIThis tutorial focuses on detecting CVEs in built images using Trivy and GitLab CI.Mar 17Mar 17
Published inAWS TipProvision a Secure AWS ElastiCache Redis Instance Using TerraformHi, I’m a DevOps Tech Lead at Cynerio.Feb 28Feb 28
Published inAWS TipCI/CD Security: Using Checkov to enforce security with terraformHi, I’m a DevOps Tech Lead at Cynerio.Feb 13Feb 13
Threat detection with Falco on EKS and using kernel module driverThis tutorial is continuation of previous one: Threat detection with Falco and EKS Audit Logs.Feb 9Feb 9
Published inLevel Up CodingMoving to Bottlerocket OS for Enhanced Security & PerformanceHi, I’m a DevOps Tech Lead at Cynerio.Feb 6Feb 6
Threat detection with Falco and EKS Audit LogsHi, I’m DevOps Engineer from Cynerio.May 9, 2024May 9, 2024
Secure namespaces in Kubernetes cluster using RBACHi, I’m DevOps Engineer at Cynerio.Jan 14, 2024Jan 14, 2024
Published inIsraeli Tech RadarOpenID Connect and Github Actions to authenticate with Amazon Web Services.Hi, I’m DevOps Engineer at Tikal Knowledge.Apr 23, 2023Apr 23, 2023