-
The unboring NIST SP 800-190
When most of us hear “NIST guidelines”, our first reaction might be “another boring PDF I’ll never open again“. My first encounter with NIST Special Publication 800-190 happened when I was studying for the GIAC GCSA exam, which is focused on DevSecOps and container security. The SP 800-190 is refreshingly different. It isn’t just another
-
A convenient homelab SSH jumphost (without the drama)
Managing a homelab is all fun and games until you’re knee-deep in IP addresses, SSH keys, and trying to remember if this server was the one with Kubernetes or the one you broke last Tuesday. SSH-ing into multiple machines gets messy fast – unless you love memorizing IPs and usernames like some sort of 2000s hacker movie
-
Proxmox firewall layers in simple terms
Proxmox VE is a phenomenal open-source virtualization platform that many of us (myself included) absolutely love. It’s powered by a strong community, and the fact that we can use it for free in our home labs or even in small production environments is a huge blessing. In my early days with Proxmox, I struggled a bit
-
Passkeys – the future of secure authentication
As a long-term fan of Yubikeys, I quickly got curious about this relatively new concept called “passkeys“. Big companies like Apple, Amazon, and Mastercard are nudging their users to adopt passkeys and use them instead of passwords. The “instead of passwords” part really got me curious! Since forever, passwords have been a part of our
-
Say “yes” to SBOMs!
Picture this: your software application is running smoothly in production, serving thousands of users. Then, you hear about a new critical vulnerability affecting open-source libraries, and panic sets in. Is your application exposed? If so, which part is at risk? Without a clear map of your software’s components, answering these questions can feel like searching
-
Is my business secure? First look at the SAMM framework
Security is becoming more important for businesses operating in an increasingly complex landscape of cyber threats and data breaches. Small businesses often don’t have the advanced security measures and resources that larger enterprises possess, making them particularly vulnerable targets for cyberattacks. A breach can result in significant financial losses, reputational damage, and legal liabilities, which