Latest Articles

Fresh deep dives into system design, security, and engineering.

Supply Chain Security — Protecting Your Software Pipeline
Cloud·April 04, 2026

Supply Chain Security — Protecting Your Software Pipeline

A comprehensive guide to software supply chain security. Covers SLSA framework, dependency pinning, reproducible builds, provenance verification, and lessons from real-world supply chain attacks (SolarWinds, Log4Shell, xz).

Security Ticketing and Incident Response
Cloud·April 04, 2026

Security Ticketing and Incident Response

Build an effective security incident response process. Covers incident classification, runbooks, ticketing workflows, communication templates, and post-incident reviews — with practical examples for cloud environments.

Security Mindset for Engineers — Think Like an Attacker
Cloud·April 04, 2026

Security Mindset for Engineers — Think Like an Attacker

Learn how to adopt a security-first mindset as a software engineer. Covers threat modeling, attack surfaces, defense in depth, and the principle of least privilege — with real-world examples from cloud environments.

Secrets Management — Vault, SSM, and Secrets Manager
Cloud·April 04, 2026

Secrets Management — Vault, SSM, and Secrets Manager

A practical guide to secrets management in cloud environments. Compare HashiCorp Vault, AWS SSM Parameter Store, and AWS Secrets Manager — with implementation patterns, rotation strategies, and common pitfalls.

Penetration Testing Basics for Developers
Cloud·April 04, 2026

Penetration Testing Basics for Developers

A developer-friendly introduction to penetration testing. Covers reconnaissance, common attack vectors, tools (Burp Suite, nmap, OWASP ZAP), writing security test cases, and how to think like an attacker without being one.

OWASP Top 10 for Cloud Applications
Cloud·April 04, 2026

OWASP Top 10 for Cloud Applications

The OWASP Top 10 through the lens of cloud-native applications. Covers how each vulnerability manifests in AWS/GCP/Azure environments, with cloud-specific attack vectors and defenses for serverless, containers, and microservices.

// topics.map()

What I Write About

hubSystem Design
securitySecurity
cloudCloud & AWS
databaseDatabases
smart_toyAI / LLMs
speedPerformance
Dependency Vulnerability Detection at Scale
Cloud·April 04, 2026

Dependency Vulnerability Detection at Scale

How to detect and manage vulnerable dependencies across hundreds of repositories. Covers SCA tools (Snyk, Dependabot, Trivy), SBOM generation, vulnerability prioritization, and building an automated remediation pipeline.

Container Security — Docker and Kubernetes Hardening
Cloud·April 04, 2026

Container Security — Docker and Kubernetes Hardening

A hands-on guide to securing Docker containers and Kubernetes clusters. Covers image scanning, rootless containers, network policies, pod security standards, and runtime threat detection.

Compliance Automation — SOC2 and ISO 27001
Cloud·April 04, 2026

Compliance Automation — SOC2 and ISO 27001

Automate compliance for SOC2 and ISO 27001 using infrastructure as code, continuous monitoring, and policy-as-code tools. Covers AWS Config, Open Policy Agent, and building evidence collection pipelines.

Building a Security Pipeline — DevSecOps in Practice
Cloud·April 04, 2026

Building a Security Pipeline — DevSecOps in Practice

How to build a complete security pipeline integrated into your CI/CD. Covers SAST, DAST, SCA, secret scanning, infrastructure scanning, and how to shift security left without slowing down developers.

Auto-Remediation with Lambda — Fix Security Issues Automatically
Cloud·April 04, 2026

Auto-Remediation with Lambda — Fix Security Issues Automatically

Build automated security remediation using AWS Lambda, EventBridge, and Config Rules. Auto-close open security groups, revoke public S3 buckets, and enforce tagging — with real Lambda code examples.

Code Signing — Why and How
Cloud·April 04, 2026

Code Signing — Why and How

Understand why code signing matters and how to implement it. Covers signing Git commits, Docker images (cosign/Notary), npm packages, and building a chain of trust from developer to production.

Build a Cloud Security Scanner — Hands-On Project
Cloud·April 04, 2026

Build a Cloud Security Scanner — Hands-On Project

Build a real cloud security scanner from scratch using Python and AWS APIs. Scan for open security groups, public S3 buckets, unencrypted volumes, overly permissive IAM policies, and generate a security report.

CloudTrail and Security Observability
Cloud·April 04, 2026

CloudTrail and Security Observability

How to build security observability in AWS using CloudTrail, CloudWatch, and Athena. Covers audit logging, anomaly detection, SIEM integration, and building custom security dashboards.

AWS IAM Security — Beyond Basic Roles
Cloud·April 04, 2026

AWS IAM Security — Beyond Basic Roles

Deep dive into AWS IAM security best practices. Covers permission boundaries, SCPs, assume role chains, session policies, and how to audit IAM for least-privilege access in production environments.

Ready to build something together?

I take on 1-2 projects at a time. Let's talk about your next challenge.

Hire Me