blog.oluwaseunmusa.comReflections on AWS re:Invent 2025: Challenges, Highlights, and Personal AchievementsIt’s been a few weeks since the completion of Amazon Web Services (AWS) re:Invent. I wanted to share some thoughts. Unfortunately, Amazon Web Services (AWS) re: Invent 2025 didn’t go as planned. Before the event, I had planned all my sessions, the ke...Jan 16·4 min read
blog.oluwaseunmusa.comSha1-Hulud 2.0: The Second ComingIt’s 4:27 AM. Your phone is buzzing. Again. Then it’s an email from your CNAPP tooling vendor titled Ongoing Supply Chain Campaign, referencing Shai-Hulud, Oh no! Shai-Hulud is back, and additional dependencies, such as Zapier, ENS Domains, PostHog, ...Nov 25, 2025·3 min read
blog.oluwaseunmusa.comUnderstanding cloud security flaws, their importance, and prevention methods.We all know that since the advent of the COVID-19 pandemic, businesses are embracing cloud computing for its scalability, flexibility, and cost savings. However, these advantages come with a growing attack surface, and cloud security flaws have becom...Aug 7, 2025·4 min read
blog.oluwaseunmusa.comHow to Implement CloudWatch Log Retention: A Best Practice for Security and Cost ManagementImagine you're in a security assessment with your Compliance Team or an External Assessor, and they point out that your AWS environment CloudWatch Log doesn't have a retention period set. CloudWatch Logs retention is an important part of AWS security...Jul 19, 2025·3 min read
blog.oluwaseunmusa.comAWS re:Inforce 2025 – Everything starts with securityAnother incredible year at AWS re:Inforce, and the 2025 edition in Philadelphia did not disappoint. Over the three days, I gained a deeper understanding of AWS security, reconnected with familiar faces who have become like family, and welcomed new pr...Jun 30, 2025·2 min read