Published inNerd For TechThreat Modeling: Getting StartedIn the ever-evolving realm of cybersecurity, understanding and mitigating potential risks are important. Threat modeling emerges as a…Mar 6Mar 6
Published inNerd For TechCNCF — Software Supply Chain Best PracticesThe CNCF Software Supply Chain Best Practices paper provides a detailed overview on the importance of a holistic approach to supply chain…Oct 5, 2023Oct 5, 2023
How to Pass the AWS Cloud Solutions Architect: SAA-C03 ExamThe AWS Solutions Architect Associate is a great certification to get exposure into how AWS and how cloud computing works. You get exposure…Jul 24, 202310Jul 24, 202310
Published inNerd For TechWhy I Joined TestifySec — Software Supply Chain SecurityIntroductionJul 18, 2023Jul 18, 2023
Published inNerd For TechAWS Well-Architected FrameworkHello, I hope that this article finds you well in your learning journey. In this short article I will discuss the Well-Architected…May 2, 2023May 2, 2023
Published inNerd For TechThe Cognyte Cloud Data Breach — 5 Billion Records LeakedCognyte is a cybersecurity data analytics company that offers a variety of services including their analytics platform, network and…Nov 21, 2022Nov 21, 2022
Published inNerd For TechSo You Want To Learn Reverse Malware Engineering?As I have explored offensive security, I have been exposed to a variety of career paths. Reverse malware engineering is something that I…Oct 13, 2022Oct 13, 2022
Published inCoinmonksUnderstanding Blockchain Technology in BitcoinBlockchain Major TechnologiesSep 21, 2022Sep 21, 2022