
Get the Squeeze on OWASP Juice Shop
Ever wanted to see the simple concepts hackers use to break into your web application, even without a technical background? In this…

Utilizing GCP Secret Manager Secrets in Cloud Functions with Terraform
Whether you are writing a quick function to hit an API or developing the backend of your very own API, you will…

Destroy your Development Environments to Control Costs
A practical example of why we should dispose of development environments when not in use and what can happen when an environment…

Git Robbing!
Open Source Intelligence (OSINT) is a large and extremely dangerous attack vector. It can often be difficult to monitor, as the product…

Making Security Relevant in the Cloud
A look at an open source tool from DataDog that looks to visualise a system’s Security Posture and remediate any gaps found…

Well-Established Test Categories
Introduction In this blog, I will not detail all existing test strategies, but at least provide a high level understanding of why…

Azure Front Door, a deeper dive – PART 1
Azure Front Door is one of the most used services in Azure and also one of the most interesting. This post will…

Cloud Architecture Certification Paths and How to Achieve Them
Getting a Cloud Architect Certification can be a daunting task. With a growing number of cloud providers and certification programs, deciding how…

Five Strategies and Microsoft Solutions that Protect Against Ransomware Attacks
Ransomware has been in the news too frequently. In this article, “Five Strategies and Microsoft Solutions that Protect Against Ransomware Attacks,” we…