Building Resilience Through Chaos Engineering on AWS EKS
Chaos engineering practices using Chaos Mesh on Amazon EKS to build more resilient cloud-native applications
-->
I write, I break things, I write some more.
Chaos engineering practices using Chaos Mesh on Amazon EKS to build more resilient cloud-native applications
AWS secrets management solution with Infrastructure as Code, cost optimization, automated rotation, and monitoring
That simple vulnerability patching pattern everyone shows? It doesn't work when you use it.
I've used these commands to catch everything from wide-open S3 buckets to overprivileged IAM roles. Here's your practical guide to AWS security auditing that comes in handy.
The irony is that Go makes building secure applications relatively straightforward, but its simplicity can be deceptive when it comes to secrets management.
As a security engineer who's implemented security controls across cloud environments, I've always been curious about how policy engines actually work under the hood
The old security playbook of reactive firefighting is breaking down under modern attack volumes. AI-driven operations are reshaping the reactive-proactive balance and what does this means for security engineers ?
Most organizations think they have observability when they really just have expensive monitoring. What is the difference and why it matters for both DevOps and security teams.
I spent years thinking I was just 'not a good reader' until a casual conversation led to a diagnosis that explained everything. Here's how dyslexia shapes my approach to learning and career in tech.
When working with Docker, one of the biggest questions you'll run into is: 'How do I store data in a container without losing it when it stops?'
We solved the 'works on my machine' problem by packaging applications in containers. But success creates its own challenges. What happens when you're running not just one container, but hundreds? Or thousands?
Remember when deploying software meant crossing your fingers and hoping it would work on the production server? When 'but it works on my machine' was the most dreaded phrase in tech? Those days are fading fast, thanks to a technology that's quietly revolutionizing how we build and ship software: containers
Let's takes you inside real organizations implementing Defense in Depth strategies, revealing what works, what doesn't, and what you can apply to your own cloud journey
The Defense in Depth is beautifully simple: never rely on just one defense. Instead, create multiple safeguards that work together. If one fails, others are ready to step in.
Articles I've published on other platforms
Exploring how GenAI can automate AWS security finding remediation in practice.
Building an automated PII detection and response system using AWS Macie, Lambda, and EventBridge.
Comprehensive tips and notes for passing the AWS DevOps Engineer Professional certification exam.
Implementing secure blue-green deployments for AWS Lambda using Jenkins, CodeDeploy, and integrated CI/CD practices.