5d ago · 15 min read · Introduction In August 2025, Ghana’s government email infrastructure experienced a disruption that left ministries and agencies unable to access official .gov.gh email services for nearly three days.
Join discussion
6d ago · 8 min read · Machine identity management is the process of securing and managing identities for non-human entities such as servers, applications, and devices in cloud environments. Unlike human identity management, which focuses on people accessing systems, machi...
Join discussionMar 2 · 4 min read · As Kubernetes adoption surges across enterprise environments, attackers are developing increasingly sophisticated exploits targeting misconfigured clusters. In March 2026, CSO Online reported a sharp uptick in Kubernetes-specific attack tooling — fro...
Join discussionFeb 19 · 14 min read · The Uncomfortable Truth Run this command against any Kubernetes Secret in your cluster: kubectl get secret my-database-secret -o jsonpath='{.data.password}' | base64 -d That's it. One command. Your production database password is now in plaintext on...
Join discussion
Feb 12 · 3 min read · 🚀 Introduction In cloud security, access control is everything. While working on AWS IAM, I implemented two advanced security controls: ✅ Restrict access based on IP address ✅ Restrict access based on specific time window In this blog, I’ll show...
Join discussion
Feb 10 · 10 min read · Cloud Security and DevSecOps are some of the major areas of cybersecurity, and Cloud Computing Fundamentals is a beginner-friendly room that introduces us to some basics of cloud, like virtualization, containerization, types of cloud deployments, clo...
Join discussion
Jan 30 · 12 min read · Introduction Many companies migrate their on-premises resources to the cloud to gain benefits such as cost savings, greater stability, and improved security. However, not all recognize the new risks that come with this transition, often leaving their...
Join discussion
Jan 28 · 5 min read · Overview AWS Identity and Access Management (IAM) is the cornerstone of AWS security. It's a free service that controls who can access your AWS resources (authentication) and what they can do with them (authorisation). For DevOps engineers, IAM is no...
Join discussion
Jan 24 · 4 min read · SSH-based access to cloud workloads remains common, but it introduces unnecessary attack surface: open inbound ports, long-lived credentials, key sprawl, and limited auditability. Modern AWS environments do not require SSH for interactive access to E...
Join discussion