Homepage
Open in app
Sign in
Get started
AVM Consulting Blog
AVM Consulting — Clear strategy for your cloud
Follow
Latest
Building and hosting applications using AWS Lightsail?
Building and hosting applications using AWS Lightsail?
AWS or Amazon Lightsail is a new kind of VPS (Virtual Private Service). It was made on the concept of easing up some businesses. Consider…
Kubernetes Advocate
Jun 8
Running Containers on AWS using Amazon ECS and AWS Fargate
Running Containers on AWS using Amazon ECS and AWS Fargate
AWS Fargate is a technology that you can use with Amazon ECS to run containers without having to manage servers or clusters of Amazon EC2
Kubernetes Advocate
Jun 8
AWS Security using organization CloudTrail
AWS Security using organization CloudTrail
The Organization CloudTrail solution will create an Organization CloudTrail within the Organization Management Account that is encrypted…
Kubernetes Advocate
Jun 8
Lapsus$, Okta, Microsoft — What happened?
Lapsus$, Okta, Microsoft — What happened?
On 21st March 2022, the Lapsus$, published a series of increasingly shocking posts in its Telegram channel. First, the group dumped what…
Security Enthusiast
Mar 26
What is Zero Trust Security?
What is Zero Trust Security?
Zero Trust has become one of cybersecurity’s most used buzzwords and it’s being misused as a marketing term. As per Gartner, vendors are…
Security Enthusiast
Feb 21
Connect To AWS RDS Instance Using SSM And SSH Tunneling
Connect To AWS RDS Instance Using SSM And SSH Tunneling
In this post, we’ll discuss how we can connect to a private RDS instance using SSM and SSH Tunneling.
Vinayak Pandey
Jan 26
Malvertising is a growing menace
Malvertising is a growing menace
You probably might have seen something like above on your devices. You can identify them as infinite, full-screen pop-up ads that won’t…
Security Enthusiast
Jan 9
Log4j Vulnerability for Dummies
Log4j Vulnerability for Dummies
By now most of you may have already heard about the Log4j security vulnerability (CVE-2021–44228) characterised as “the single biggest…
Security Enthusiast
Dec 15, 2021
Cyber security should be at the core of application development culture, not an afterthought
Cyber security should be at the core of application development culture, not an afterthought
Summary
Bill Taylor
Dec 8, 2021
Deepfake — When seeing is no longer believing
Deepfake — When seeing is no longer believing
How many times do you see a video of famous personalities saying something ‘strange’ which you believe they have would not say? How many…
Security Enthusiast
Oct 30, 2021
Setup DevSecOps pipelines with open-source tools
Setup DevSecOps pipelines with open-source tools
DevSecOps is the methodology of integrating security tools within the DevOps process in an automated fashion. This multicultural…
Security Enthusiast
Oct 4, 2021
Deploying Secure AWS Guard-Duty (Threat Intelligence) In AWS
Deploying Secure AWS Guard-Duty (Threat Intelligence) In AWS
Amazon GuardDuty gives users the ability to monitor one or multiple AWS accounts for unusual and unexpected behavior. This is accomplished…
Kubernetes Advocate
Sep 21, 2021
Building a Global Network with AWS Transit Gateway
Building a Global Network with AWS Transit Gateway
Connecting branch and corporate offices into the AWS cloud to build a global network is necessary to provide ubiquitous accessibility for…
Kubernetes Advocate
Sep 21, 2021
Creating EFS File System And Mount Targets Using Terraform
Creating EFS File System And Mount Targets Using Terraform
In this post, we’ll see how we can create EFS File System and Mount Targets using Terraform.
Vinayak Pandey
Sep 16, 2021
Securing AWS Resources with Cfn Nag
Securing AWS Resources with Cfn Nag
Analysing CloudFormation templates for security vulnerabilities
Ross Rhodes
Sep 7, 2021
Cross-Region AWS EFS Data Transfer Using AWS DataSync
Cross-Region AWS EFS Data Transfer Using AWS DataSync
How to Provision source and destination locations for AWS EFS and transfer data with AWS DataSync.?
Kubernetes Advocate
Aug 30, 2021
LockBit Ransomware attack on Accenture for Dummies
LockBit Ransomware attack on Accenture for Dummies
Amid a string of attacks against corporate and infrastructure targets, ransomware has become a critical threat to national and economic…
Security Enthusiast
Aug 29, 2021
Installing Vault On EKS With TLS And Persistent Storage
Installing Vault On EKS With TLS And Persistent Storage
In this post, we’ll set up Vault on AWS EKS with TLS and Persistent Storage.
Vinayak Pandey
Aug 24, 2021
Improve your Security using AWS Security hub
Improve your Security using AWS Security hub
AWS Security Hub gives you a comprehensive view of your security alerts and security posture across your AWS accounts
Kubernetes Advocate
Aug 2, 2021
Protecting your Web Application or APIs using AWS WAF
Protecting your Web Application or APIs using AWS WAF
AWS WAF is a web application firewall that helps protect your web applications or APIs against common web exploits and bots that may affect
Kubernetes Advocate
Aug 2, 2021
DDoS detection and mitigation protection using AWS Shield?
DDoS detection and mitigation protection using AWS Shield?
AWS Shield Standard tier, which provides basic DDoS protection, is automatically enabled for all AWS customers at no additional charge…
Kubernetes Advocate
Aug 2, 2021
AWS Secret Manager: Protect sensitive information and functionality
AWS Secret Manager: Protect sensitive information and functionality
Protect Your Secrets in ApplicationsSecrets are frequently used to protect sensitive information and functionality.
Kubernetes Advocate
Jul 23, 2021
REvil Ransomware attack on Kaseya VSA for Dummies
REvil Ransomware attack on Kaseya VSA for Dummies
On July 2, while many businesses had staff either already off or preparing for a long holiday weekend, there has been news surfacing…
Security Enthusiast
Jul 10, 2021
Using AWS Endpoint Services To Securely Expose Applications
Using AWS Endpoint Services To Securely Expose Applications
In this post, we’ll see how we can utilize AWS Endpoint Services to securely expose our applications to other AWS accounts. Traditionally…
Vinayak Pandey
Jul 1, 2021
Running OpenVPN Server With ALB And NLB
Running OpenVPN Server With ALB And NLB
In https://vinayakpandey-7997.medium.com/configure-openvpn-server-to-access-private-ec2-instances-2b0a51970042, we saw how we can use…
Vinayak Pandey
Jun 29, 2021
About AVM Consulting Blog
Latest Stories
Archive
About Medium
Terms
Privacy