Articles

Navigating the Nullcon Experience in Goa

I attended Nullcon in Goa and found myself immersed in cutting-edge cybersecurity talks, but some logistical hiccups caught my attention. Dive into my candid take on balancing enlightening content with a smooth event experience.

My CISSP Journey

I finally achieved my CISSP certification. This article describes how I planned and did everything. It wasn’t that big of a task as others make it to be and proper planning and guidance goes a long way.

Cloud Security Roadmap

A cloud security roadmap is a strategic plan that outlines the steps and actions an organization needs to take to secure its cloud environment. It provides a comprehensive view of the organization’s security posture and helps align security efforts with overall business objectives. The roadmap …

Publishing SCC findings to a Pub/Sub

Security Command Center is Google Cloud’s centralized vulnerability and threat reporting service. Security Command Center helps you strengthen your security posture by evaluating your security and data attack surface; providing asset inventory and discovery; identifying misconfigurations, …

CKS #1: 4 C's of Cloud Native Security

Threat actors frequently find opportunities in complex software systems, and cloud-native systems are no exception. Defense-in-depth methodology, used by cloud-native security, separates the system into four tiers. The four Cs of cloud-native security are: Cloud, Cluster, Container and Code

Delete Kubernetes namespace stuck in terminating status

If you have encountered or are stuck with a namespace stuck in Terminating stage, you can remove it easily using kubectl