articles.
Redox keyboard after 6 years
Micro USB prongs/hooks are not a good idea
Read more ⟶Yet Another AWS IAM primer
An opinionated primer with a helpful mental model for AWS IAM.
Read more ⟶A practical mnemonic for cybersecurity maturity
Cross-account access in public cloud
Introducing Clotho an "offline" egress AWS proxy written in Rust (and Python)
Read more ⟶A day in Squid with ICAP
A deep dive in ICAP, the Internet Content Adaptation Protocol, with a bit of Rust
Read more ⟶On trusting cloud vendors and insider threats
Certificates, Encryption, and insider threats in Cloud Service Providers
Read more ⟶The website that sets the most cookies
The amount of advertising and analytics partners that websites use has surged, which website sets the most cookies?
Read more ⟶Enteprise problem solving
Greek Keno Statistics
Race conditions in Cloud Security Posture Management
On heavily leaning on detective controls for security in the cloud
Read more ⟶From Medium.com to Zola
Moving from Medium.com to Zola primarily because of tables
Read more ⟶