Mar 20 · 10 min read · You're an attorney. You went to law school to argue cases and advise clients, not to become a cybersecurity expert. But here's the reality: the ABA says you have an ethical obligation to understand th
Join discussion
Mar 9 · 15 min read · TLDR: SSL (now TLS) secures data between your browser and a server. It uses Asymmetric Encryption (Public/Private keys) once — to safely exchange a fast Symmetric Session Key. Everything after the handshake is encrypted with the session key. 📖 The...
Join discussionMar 5 · 4 min read · If you're running the excellent Let's Encrypt automation for Oracle Cloud Infrastructure built by Scotti Fletcher (full details in his original post here), there's a good chance your certificates have
Join discussion
Feb 22 · 16 min read · The PKIX path building failed: sun.security.provider.certpath.SunCertPathBuilderException: unable to find valid certification path to requested target error is one of the most common issues when deploying ForgeRock Directory Services (DS) in producti...
Join discussionFeb 6 · 6 min read · Introduction: Locking it Down - From HTTP to HTTPS In the preceding chapters, we established the networking foundation for a production-grade bare-metal Kubernetes platform. In Chapter 1, we implemented MetalLB to provide stable LoadBalancer IPs, so...
Join discussion
Jan 30 · 5 min read · At some point, logs alone stop being enough. You start seeing short spikes in CPU, random latency jumps, or brief outages that don’t leave a clear trace in the logs. That’s where real monitoring pays off: numbers, charts, history, and alerts. This gu...
Join discussion