top of page
Search


Securing Terraform Secrets with CyberArk Conjur & Inject Secrets using Summon
In this article, we shall explore - an open-source alternative to securely store and retrieve secrets with Terraform.

sandeepseeram
Feb 10, 20236 min read
849 views
BPF Compiler Collection (BCC) for Observability, Performance, Monitoring, and Tracing
The BPF Compiler Collection (BCC) is a set of powerful tracing and performance analysis tools for Linux systems.

sandeepseeram
Jan 19, 20233 min read
342 views
"Roadmap Learning" - Efficient way to learn new technologies - Ex. DevSecOps Roadmap
One way to lay a strong foundational learning into something new, is to create and follow a roadmap.

sandeepseeram
Jan 7, 20234 min read
442 views
Enterprise Security Architecture in the TOGAF Context
@TOGAF There are two security concepts: 1. ISM – Information Security Management 2. ERM – Enterprise Risk Management.

sandeepseeram
Apr 16, 20223 min read
3,978 views
Docker Privileged Container Escape
Privileged docker containers are containers that are run with the --privileged flag. Its a liability!!!

sandeepseeram
Nov 8, 20212 min read
476 views
bottom of page