PinnedPublished inOSINT TeamBuild Your Own Cyber Threat Intelligence System…at Home!Learn how to collect Threat Intelligence for freeAug 2, 2024A response icon17Aug 2, 2024A response icon17
PinnedPublished inAWS TipStop using SSH in AWS! Here’s Why! A DevSecOps PerspectiveUsing Session Manager to provide secure EC2 access, whilst improving incident response capabilities with activity recording.Jul 28, 2024A response icon14Jul 28, 2024A response icon14
Published inITNEXTAWS Feature Update: EKS Pod Identity EnhancementsIAM Role Chaining to Simplify Cross-Account AccessJun 15Jun 15
Published inITNEXTTerraform Ephemeral Resources: Solving State SecuritySecrets Management Improvements to Terraform LifecycleJun 8Jun 8
I Was a Speaker at HashiDays London ConferenceTalking about Vault, Platform Engineering and moreJun 4Jun 4
Published inITNEXTMulti-Architecture Container Pipeline using GitLab & Docker Build KitBuilding containers for Amazon Graviton CPU, Apple Silicon (ARM) or x86 based Linux and Windows PlatformsMar 3Mar 3
Published inITNEXTContainer Security: Vulnerability Management & RemediationKeep your containers vulnerability free & updatedFeb 9A response icon1Feb 9A response icon1
Terraform 1.10.0 — State Locking Now Available In AWS S3 BucketsA Simplification of the Terraform & AWS ModelDec 9, 2024A response icon4Dec 9, 2024A response icon4