PinnedNoahAn Intro to Kubernetes Hardening.Securing Kubernetes requires an understanding of many moving parts. This intro discusses the most important concepts for its defence.8 min read·Jan 6, 2024--3--3
PinnedNoahHypercomputation and the Limits of Computing.We have proven physical limits on precision, speed and energy, but are yet to bound computability.14 min read·Apr 30, 2023----
NoahKubernetes Security Tools: FalcoFlaco, the goto for real time Kubernetes threat detection.10 min read·May 5, 2024----
NoahKubernetes Security Tools: OPA Gatekeeper & TrivyOPA Gatekeeper and Trivy are important Kubernetes security tools for admission control and to limit vulnerabilities and misconfigurations.14 min read·Mar 12, 2024----
NoahKubernetes Security Tools: Seccomp & AppArmorSeccomp and AppArmor are common Linux security modules which Kubernetes supports to control workload exposure to the kernel.6 min read·Mar 6, 2024----
NoahinAWS in Plain EnglishThe Issue with Security Groups for EC2 Instance Isolation.Security groups are commonly used to isolate instances as part of incident response. However, such solutions are not perfect.4 min read·Mar 2, 2024----
NoahA Kubernetes Pentesting Checklist.Attacking the Kubernetes control plane, RBAC, EKS and more.13 min read·Feb 4, 2024----
NoahinAWS in Plain EnglishTop 10 Offensive Techniques for AWS.The cloud has become centrepiece to IT operations. Therefore, penetration testers and defenders should be familiar with common AWS attacks.12 min read·Oct 8, 2023----
NoahAdversarial LLM Attacks and the Alignment and Defence of AI.Recent work highlights the difficulty in aligning and securing LLMs - they are not invulnerable and their output must be treated…7 min read·Aug 20, 2023----
NoahSchnorr’s Identification Scheme.Authorisation schemes based on zero-knowledge proofs are robust to traditional attacks such as key logging, eavesdropping and data…7 min read·Aug 19, 2023----