top of page
Search

sandeepseeram
Feb 10, 20236 min read
Securing Terraform Secrets with CyberArk Conjur & Inject Secrets using Summon
In this article, we shall explore - an open-source alternative to securely store and retrieve secrets with Terraform.
810 views
sandeepseeram
Jan 19, 20233 min read
BPF Compiler Collection (BCC) for Observability, Performance, Monitoring, and Tracing
The BPF Compiler Collection (BCC) is a set of powerful tracing and performance analysis tools for Linux systems.
338 views
sandeepseeram
Jan 7, 20234 min read
"Roadmap Learning" - Efficient way to learn new technologies - Ex. DevSecOps Roadmap
One way to lay a strong foundational learning into something new, is to create and follow a roadmap.
435 views
sandeepseeram
Apr 16, 20223 min read
Enterprise Security Architecture in the TOGAF Context
@TOGAF There are two security concepts: 1. ISM – Information Security Management 2. ERM – Enterprise Risk Management.
3,940 views
sandeepseeram
Nov 8, 20212 min read
Docker Privileged Container Escape
Privileged docker containers are containers that are run with the --privileged flag. Its a liability!!!
456 views
bottom of page