Published onNovember 16, 2025Part 3: Software Composition Analysis (SCA) with TrivyDevSecOpsTrivySCAConducting Software Composition Analysis (SCA) in a Jenkis DevSecOps pipeline with Trivy
Published onAugust 3, 2025Part 2: Static Application Security Testing (SAST) with SemgrepDevSecOpsSemgrepSASTStatic Application Security Testing (SAST) in a Jenkis DevSecOps pipeline with Semgrep
Published onJune 15, 2025Designing a PCI DSS v4 Compliant Environment on AWSCloudPCI-DSSAWSA guide to building a secure AWS Cloud environment for PCI DSS v4 compliance
Published onNovember 5, 2024Beyond the Prompt: The #1 Security Risk in LLMsLLMAIInjectionPrompt injection in LLMs, security implications and recommended mitigations
Published onAugust 17, 2024AWS Bedrock: Securing LLMs with Token-Based AuthenticationCloudIAMAILLMImplementing token-based authentication for an AWS bedrock API on AWS SAM