Published onJuly 8, 2022Creating a CIS Level 1 Hardened AWS AMICloudComplianceSimple guide for creating a CIS hardened AWS AMI
Published onJuly 1, 2022Leveraging Cloud for Data Protection ComplianceCloudData-PrivacyInsights on using Cloud for Data Protection Compliance
Published onMay 25, 2022Securing Android Application User SessionsIAMSecrets-ManagementA guide to building secure user sessions on Android applications
Published onMay 17, 2022Spring Boot Authentication and AuthorizationIAMA guide to building secure user authentication and authorization in Java Spring Boot
Published onMay 14, 2022Authentication Bypass Through PHP Type JugglingIAMBug-BountyDemonstrating authentication bypass by exploiting PHP Type Juggling