
Multi-factor Authentication
What is the need for Multi-factor Authentication (MFA)? The most common way used to secure any account (or application) is using a password and username or email. This method of login provides only a single layer of security and the credentials can be compromised by using methods like brute force ... Read More

Creating CNAME for Google Cloud Functions
In this blog we will create a CNAME for our cloud functions with path matchers. The problem with cloud function is that they use long urls. We will be using the load balancer method to create a CNAME. We will create three path matchers for three separate cloud functions. How ... Read More

Creating CNAME for Google Cloud Run Service Functions
In this blog, we will create a CNAME for our cloudrun service function with path matchers. We will be using the load balancer method to create a CNAME. We will create three path matchers for three separate cloudrun services. How to create a CNAME for Google cloud run service functions ... Read More
What is Dirty Pipe Vulnerability and it’s impact on Containers?
Disclosure A new Critical Linux vulnerability was disclosed to the public on 7th March by Max Kellermann. It’s tracked as CVE-2022-0847 and has a severity score of 7.8 (HIGH). This Dirty Pipe Vulnerability is similar to Dirty Cow Vulnerability, recorded as CVE-2016-5195. But, is much easier to exploit. Dirty Cow ... Read More

What is Dirty Pipe Vulnerability and it’s impact on Containers?
Disclosure A new Critical Linux vulnerability was disclosed to the public on 7th March by Max Kellermann. It’s tracked as CVE-2022-0847 and has a severity score of 7.8 (HIGH). This is similar to Dirty Cow Vulnerability, recorded as CVE-2016-5195. But, is much easier to exploit. Dirty Cow vulnerability was surfaced ... Read More

Why do we need continuous audits for public cloud?
Introduction to Continuous audits for public cloud Businesses have lost track of crucial control measures needed for their cloud infrastructure due to the rapid adoption of cloud computing, AWS, Azure, and Google cloud services are now more popular than ever due to the pace of innovation and customer expectations from ... Read More

Why do we need continuous audits for public cloud?
Introduction to Continuous audits for public cloud Businesses have lost track of crucial control measures needed for their cloud infrastructure due to the rapid adoption of cloud computing, AWS, Azure, and Google cloud services are now more popular than ever due to the pace of innovation and customer expectations from ... Read More