avatar

Writing about cloud, security, and building reliable systems.

GCP (6) KUBERNETES (4) GKE (3) GOOGLE-CLOUD (3) IAM (3) CLOUD-SECURITY (2) CTF (2) LINUX (2) PENTESTING (2) PROMETHEUS (2) TRYHACKME (2) AUDIT-LOGS (1) AZURE-AD (1) BASH (1) CAREER-GROWTH (1) CISSP (1) CLOUD-FUNCTIONS (1) CLOUD-LOGGING (1) CLOUD-MONITORING (1) COMMAND-LINE (1) COST-OPTIMIZATION (1) CYBERSECURITY (1) CYBERSECURITY-CERTIFICATION (1) DEVOPS (1) DICOM (1) EXAM-PREP (1) FINOPS (1) FZF (1) GCP-NETWORKING (1) GOLDEN-SIGNALS (1) GRAFANA (1) HAPROXY (1) HEALTHCARE-HACKING (1) HSTR (1) IAM-MONITORING (1) IDENTITY-ACCESS-MANAGEMENT (1) IDENTITY-AWARE-PROXY (1) JENKINS (1) KUBERNETES-SECURITY (1) LOAD-BALANCER (1) METADATA-SERVER (1) MONITORING (1) NETWORKING (1) OBSERVABILITY (1) ORACLE (1) ORTHANC (1) PRIVILEGE-ESCALATION (1) PRODUCTIVITY (1) PUBSUB (1) PYTHON (1) RISK-MANAGEMENT (1) SECURITY (1) SERVERLESS-SECURITY (1) SERVICE-ACCOUNTS (1) SIEBEL (1) SLACK (1) SPOT-INSTANCES (1) SSO (1) STUDY-GUIDE (1) TCP-PROXY (1) TEST-AUTOMATION (1) TRAEFIK (1) VPC (1) WALKTHROUGH (1) ZERO-TRUST (1)