This post will cover the detailed step by step process to deploy Keycloak in a production environment using AWS EC2 Server. We will use Docker containers and Maria DB as the database. For securing the portal, we will use NGINX and certbot to generate Letsencrypt certificate. The steps can be broken down as following: Create a domain/subdomain to be used …
Read More »Kumar AS.
A Detailed Comparison of SASE and SSE Security Solutions
Security technologies have evolved rapidly, especially in response to the shift toward cloud services and remote work. As organizations face increasing cyber threats, the need for sophisticated, integrated security solutions has never been greater. Secure Access Service Edge (SASE) and Security Service Edge (SSE) have emerged as two dominant frameworks for addressing modern security and networking needs. While both offer …
Read More »The Quantum Apocalypse: The End of Encryption?
The term “Quantum Apocalypse” might sound like the plot of a science fiction movie, but it’s a very real challenge facing the future of cybersecurity. With the rapid advancement of quantum computing, modern encryption methods, which currently secure everything from our personal data to government secrets, could soon become obsolete. In this blog post, we’ll explore the concept of the …
Read More »Top 10 High Value Cybersecurity Certifications for 2025 and beyond
Cybersecurity certifications will be among the most rewarding credentials in the coming years due to the escalating threat landscape and soaring demand for skilled professionals. As cyberattacks, data breaches, and ransomware incidents grow, companies are prioritizing cybersecurity investments, driving the need for certified experts who can effectively secure networks, cloud environments, and sensitive data. 1. Certified Information Systems Security Professional …
Read More »What is a Firewall: Defined, Explained, and Explored
Security is paramount for modern networks, and a Firewall helps inject security by filtering the traffic passing back and forth to a network or a system. This is the reason that Firewalls are widely regarded as the first line of defense. Modern Firewalls provide multiple security features and help organizations and individuals set parameters and create different logical security zones …
Read More »What is Fuzzing: Types, Advantages & Disadvantages
Fuzzing or Fuzz testing is increasingly getting popular and is used and advocated by some of the most reputed organizations, including Apple, Microsoft, Google, Cisco, and IBM. In this post, we will do a deep dive around what is Fuzzing, its advantages, disadvantages, and the tools used for Fuzzing. Industry bodies & regulatory agencies requiring or recommending fuzz testing include …
Read More »What are Web Cookies: Privacy, Security & Compliances
Cookies, also known as “Web Cookies” or “HTTP Cookies”, are widely used across the Internet since their inception in 1994. They were invented by a 23-year-old computer programmer Lou Montulli in 1994 when he was working with Netscape. In this post, we will take a deep dive into the functioning of cookies, privacy concerns, security risks & compliances. One key …
Read More »What is SSL Stripping: Defined, Explained and Explored
An attacker can remove the encryption from a client-server communication by using SSL stripping, aka SSL Hijacking. In this post, we will discuss SSL stripping and some related topics in detail. While SSL is used to secure the communication between the client and the server across the Internet, SSL can often provide a false sense of security. Moxie Marlinspike, a …
Read More »What is ARP Spoofing/Poisoning & tips for security
ARP Spoofing consists of a hacking technique created to impersonate entities or people on the network to obtain private information or gain access to websites and applications with a stolen session-id or credentials or launch a DoS attack. To understand what ARP spoofing is and how it works, we need to understand more about Address Resolution Protocol and its functioning. …
Read More »Data Loss Prevention: DLP limitations and how to bypass?
DLP, as you might be aware, stands for Data Loss Prevention or Data Leaks prevention. It’s a purpose-built solution to protect sensitive information from moving out. DLP solutions have been around for over a decade and a half and have come a long way, yet it’s surprisingly easy to bypass the DLP solution. We can define the DLP solution as …
Read More »