Mar 23 · 7 min read · Spry Security Best Practices: Authentication, Authorization, and Data Protection Security is non‑negotiable for production‑grade Spry applications. In this comprehensive guide, we'll implement industry‑best security practices for Spry – the next‑gene...
Join discussionMar 20 · 10 min read · You're an attorney. You went to law school to argue cases and advise clients, not to become a cybersecurity expert. But here's the reality: the ABA says you have an ethical obligation to understand th
Join discussion
Feb 12 · 4 min read · Running containers is easy.Running them securely, efficiently, and reliably on production EKS?That’s engineering. Over the past weeks, I’ve been diving deep into: 🔐 Kubernetes security (especially in EKS) ⚙️ Resource management (CPU/Memory control...
Join discussionJan 22 · 2 min read · Understanding Prompt Injection Attacks Prompt injection is one of the most significant security risks facing AI-powered applications today. In this article, we'll explore what prompt injection is, how it works, and how to protect against it. What is ...
Join discussionJan 18 · 1 min read · Hi All, Pls refer to this solution that we created (open source) RBAC algorithm and let us know the feedback github pages:https://maneesh-relanto.github.io/RBAC-algorithm/ github repo:https://github.com/Maneesh-Relanto/RBAC-algorithm Thanks
Join discussion
Jan 16 · 4 min read · Over the last year (actually 8 months), I managed to publish 23 posts on this blog. It meant a lot of long days, numerous lab rebuilds, half-finished markdown litter, and more time than I care to admit staring at Kubernetes YAML wondering why somethi...
Join discussion
Jan 14 · 14 min read · Welcome back! 👋 Day 70 of the 100 Days Cloud DevOps Challenge, and today we're implementing Jenkins Role-Based Access Control! This is security best practice - controlling who can access what in your CI/CD platform with granular permissions. Let's s...
Join discussion