Personal analysis of Gartner's Magic Quadrant for Application Security Testing 2025. What platform consolidation and AI integration mean for security leaders, vendors, and the future of AppSec tools.
Blog
You’ll find posts here on cloud security, solution architectures and architecture patterns, security research, zero-day vulnerabilities, and broader technical explorations.
Deep dive into intra-VPC traffic inspection patterns for east-west flows. Learn how to implement subnet-to-subnet inspection with Gateway Load Balancer and AWS Network Firewall, maintain symmetry, and avoid common pitfalls in single and multi-AZ deployments.
Practical guide to AWS network traffic inspection patterns that scale. Learn deployment models, routing mechanics, and common pitfalls for east-west and north-south traffic inspection across VPCs, regions, and hybrid environments.
Navigating the complex landscape of generative AI security responsibilities using AWS's Generative AI Security Scoping Matrix to clarify who owns what risks across different adoption scopes.
Secure AWS CI/CD without secrets: GitHub Actions OIDC with IAM role assumption eliminates static credentials, reduces security risks, and simplifies deployment automation for modern cloud workflows.
A personal journey through cloud certifications: why AWS stands out with its no-shortcut approach, practical exam design, and comprehensive learning ecosystem that rewards real-world experience over memorization.
A detailed analysis of two security vulnerabilities found in the AWS Serverless Application Model CLI (AWS SAM CLI) – CVE-2025-3047 and CVE-2025-3048 – along with the code-level issues and fixes.
Comprehensive analysis of four critical security vulnerabilities discovered in the AWS Tough Library, including detailed root cause analysis, impact assessment, and remediation strategies.
Analysis of CVE-2024-23897, a critical vulnerability in Jenkins CI that allows authenticated attackers to read arbitrary files through the CLI, potentially leading to remote code execution.
Analysis of SQL Injection vulnerabilities in GeoServer and GeoTools that allow attackers to execute arbitrary SQL queries through OGC filter and function expressions.