layout: default title: Blog —
Technical Blog & Articles
Deep-dive technical articles, hands-on guides, and insights from my cloud security and cybersecurity journey.
Read more on Medium →
AWS & Cloud Security
Why Cloud Security is No Longer Optional for Growing Businesses
July 8, 2025
Cloud computing has fundamentally reshaped how businesses operate. This article explores why cloud security is critical for growing businesses and the evolving threat landscape in modern cloud environments.
Using Service Control Policies (SCPs) to Restrict AWS Account Access
April 16, 2025 | AWS in Plain English
A comprehensive hands-on guide on implementing Service Control Policies to enforce security controls and restrict access across AWS accounts. Learn how to leverage AWS Organizations for effective multi-account security governance.
Building an AWS Multi-Account Structure with AWS Organizations
April 15, 2025
A practical hands-on lab walkthrough on implementing AWS Organizations for multi-account management. Learn the steps to structure multiple AWS accounts for scalability, security, and cost optimization.
GuardDuty - Runtime Monitoring for EC2: A Hands-on Guide
February 27, 2025
Learn how to implement AWS GuardDuty for runtime monitoring of EC2 instances. Includes hands-on implementation steps and troubleshooting techniques for detecting and responding to threats in your AWS environment.
Implementing Envelope Encryption with AWS KMS
February 16, 2025
A step-by-step guide on implementing envelope encryption using AWS Key Management Service (KMS). Understand how to secure your data at rest with advanced cryptographic techniques.
Security & Threat Analysis
Digital Deception: Dissecting a Phishing Email and Its Malicious Payload
January 13, 2025
A deep technical analysis of a phishing attack, breaking down the attack chain, payload analysis, and indicators of compromise. Learn how to identify and respond to sophisticated phishing attempts.
Advanced Techniques in Email Header Analysis for Phishing Detection
January 13, 2025
Master the techniques of email header analysis to detect and prevent phishing attacks. Learn how to trace email origins, identify spoofing attempts, and extract valuable forensic information from email metadata.
Phishing Detection and Mitigation in Practice: The Mighty Solutions, Inc. Case
January 10, 2025
A real-world case study on identifying and mitigating phishing attacks in an organizational context. Learn practical strategies for threat detection, incident response, and employee security awareness.
Data Loss Prevention in the Cloud: A Comprehensive Guide with a Focus on AWS
AWS in Plain English
Learn comprehensive data loss prevention strategies in cloud environments with a deep focus on AWS. Understand how to protect sensitive data at rest and in transit using AWS services and best practices.
Microsoft Security Updates: Critical Fixes and Zero-Day Vulnerabilities
January 2025
Stay informed on the latest Microsoft security updates, critical patches, and zero-day vulnerability disclosures. Learn how to prioritize and implement security updates in your Microsoft environment.
Infrastructure & Hands-On Labs
Launching an EC2 Linux Hands-On Lab
2025
A practical hands-on guide to launching and configuring EC2 Linux instances on AWS. Learn best practices for instance configuration, security, and management in a lab environment.
Want to Read More?
Visit my Medium profile for the complete collection of articles and stay updated with new technical write-ups.
Visit Medium Profile →Want to discuss these topics or collaborate?
Get In Touch