
AI Didn’t Wait for Security. Now What?
Learn why blocking AI tools backfires and how to govern AI adoption with centralized security guardrails that keep teams fast and secure.
12 articles tagged with “Security”

Learn why blocking AI tools backfires and how to govern AI adoption with centralized security guardrails that keep teams fast and secure.

AWS Secrets Manager vs SSM Parameter Store compared: cost, rotation, encryption, versioning, and IaC support to help you choose.

14 real-world AWS Lambda security best practices: input validation, IAM least privilege, secrets management, and tenant isolation.

Fell for a phishing attack using social engineering? I did—almost. Here’s how it worked, the tech behind it, and tips to stay safe.

Learn how to simplify AWS security, manage WAF rules, and enforce policies across accounts with AWS Firewall Manager, with AWS CDK code

learn about AWS Web Application Firewall (WAF) and use CDK code to protect an REST API served by an API Gateway and enable metrics and logs

Learn about the AWS Web Application Firewall (WAF), what it is for, tips, and insights for visibility, ownership, governance and more

AWS security best practices for service to service authentication, authorization and cross-account access with IAM policies and python code.

We'll explore chaos engineering in AWS serverless architecture, using AWS FIS for fault injection and providing example code.

Introduction to chaos engineering for serverless: inject controlled failures with AWS FIS to improve resilience and disaster recovery.

Before going to production, go through this checklist. The checklist spans security, backups, crisis recovery, CI/CD, and support readiness.

AWS Lambda input validation and parsing best practices using Pydantic and Powertools for AWS Lambda to ensure type-safe handlers.
Ready to level up?
Whether you need architecture guidance, a platform strategy, or a second pair of expert eyes — I'm here to help.