Published injhash-ingsSo you want to be identity engineerWhy identity engineering is a specialized field and how to get readyApr 6, 2024Apr 6, 2024
passkey - A developer guideA quick technical introduction and exploration of passkeys, W3C webauthn and FIDOOct 17, 20231Oct 17, 20231
Published injhash-ingsIn past, we see futureA collection of my articles that explore how the concepts remain the same while the implementations change.Mar 25, 2023Mar 25, 2023
Published injhash-ingsBuilding flexible product configurationBalancing security, preference with configurabilityFeb 23, 2023Feb 23, 2023
Published injhash-ingsAWS ECS vs Google Cloud run jobsAn apple to near-apple comparisonJun 13, 20221Jun 13, 20221
Published inBetter ProgrammingScale GitHub Workflows With AWS ECSusing a self-hosted runner without access keys, complex lambda functions, or Kubernetes clustersMay 31, 20221May 31, 20221
Published inInfoSec Write-upsUsing PGP to enhance security and non-repudiation of terraform opsTerraform has transitioned to a lingua franca for multi-cloud infrastructure as a code. Explore approaches and script to secure terraformApr 27, 20221Apr 27, 20221
Published inGeek CultureGo modules in mono-repoBalancing development flexibility with structured release processJan 10, 2022Jan 10, 2022
Published inGeek CultureProject estimation with excelPerform cost and time estimation with leveled resource without complex macrosOct 29, 2021Oct 29, 2021
Published inGeek CultureSecuring DevOps workhorseConsiderations for deploying and securing DevOps remote agentsOct 22, 2021Oct 22, 2021
Published inGeek CultureDeveloping using PowerShellLearnings from large powershell based developmentJul 24, 2021Jul 24, 2021
Published inGeek CultureIdentity administration platform: A weak link post-RMM supply-chain attack ?Re-evaluating centralized provisioning and service accounts post-RMM supply-chain attacksJul 13, 2021Jul 13, 2021
Published injhash-ingsIs Kubernetes the new DCE?Kubernetes continues to make great stride as distributed computing platform like DCE in 1990s. We look at past to predict the future.Feb 25, 2021Feb 25, 2021
Published inGeek CultureEnterprise Cloud Security: Application DevelopmentPart III: Developing secure applicationFeb 13, 2021Feb 13, 2021
Published injhash-ingsEnterprise Cloud Security: FoundationPart II: Security consideration for cloud foundationDec 30, 2020Dec 30, 2020
Published injhash-ingsEnterprise cloud security : IntroductionAn introduction to descriptive approach to cloud security in enterprise.Dec 26, 2020Dec 26, 2020
Published injhash-ingsSession Broker : Features and challengesGrowth of PAM & CASB has made session brokering an important part of enterprise toolset. This article explores features and challenges.Dec 7, 2020Dec 7, 2020
Published injhash-ingsIs private enterprise blockchain an oxymoron?Or how to build a consortium of 1Oct 27, 2018Oct 27, 2018