layout: default title: Blog —

Technical Blog & Articles

Deep-dive technical articles, hands-on guides, and insights from my cloud security and cybersecurity journey.
Read more on Medium →

AWS & Cloud Security

Why Cloud Security is No Longer Optional for Growing Businesses

July 8, 2025

Cloud computing has fundamentally reshaped how businesses operate. This article explores why cloud security is critical for growing businesses and the evolving threat landscape in modern cloud environments.

Cloud Security AWS Best Practices
Read Full Article →

Using Service Control Policies (SCPs) to Restrict AWS Account Access

April 16, 2025 | AWS in Plain English

A comprehensive hands-on guide on implementing Service Control Policies to enforce security controls and restrict access across AWS accounts. Learn how to leverage AWS Organizations for effective multi-account security governance.

AWS Organizations SCPs IAM Access Control
Read Full Article →

Building an AWS Multi-Account Structure with AWS Organizations

April 15, 2025

A practical hands-on lab walkthrough on implementing AWS Organizations for multi-account management. Learn the steps to structure multiple AWS accounts for scalability, security, and cost optimization.

AWS Organizations Multi-Account Infrastructure
Read Full Article →

GuardDuty - Runtime Monitoring for EC2: A Hands-on Guide

February 27, 2025

Learn how to implement AWS GuardDuty for runtime monitoring of EC2 instances. Includes hands-on implementation steps and troubleshooting techniques for detecting and responding to threats in your AWS environment.

GuardDuty EC2 Threat Detection
Read Full Article →

Implementing Envelope Encryption with AWS KMS

February 16, 2025

A step-by-step guide on implementing envelope encryption using AWS Key Management Service (KMS). Understand how to secure your data at rest with advanced cryptographic techniques.

KMS Encryption Data Security
Read Full Article →

Security & Threat Analysis

Digital Deception: Dissecting a Phishing Email and Its Malicious Payload

January 13, 2025

A deep technical analysis of a phishing attack, breaking down the attack chain, payload analysis, and indicators of compromise. Learn how to identify and respond to sophisticated phishing attempts.

Phishing Malware Analysis Threat Intel
Read Full Article →

Advanced Techniques in Email Header Analysis for Phishing Detection

January 13, 2025

Master the techniques of email header analysis to detect and prevent phishing attacks. Learn how to trace email origins, identify spoofing attempts, and extract valuable forensic information from email metadata.

Email Forensics Header Analysis Detection
Read Full Article →

Phishing Detection and Mitigation in Practice: The Mighty Solutions, Inc. Case

January 10, 2025

A real-world case study on identifying and mitigating phishing attacks in an organizational context. Learn practical strategies for threat detection, incident response, and employee security awareness.

Incident Response Mitigation Case Study
Read Full Article →

Data Loss Prevention in the Cloud: A Comprehensive Guide with a Focus on AWS

AWS in Plain English

Learn comprehensive data loss prevention strategies in cloud environments with a deep focus on AWS. Understand how to protect sensitive data at rest and in transit using AWS services and best practices.

Data Protection DLP Compliance
Read Full Article →

Microsoft Security Updates: Critical Fixes and Zero-Day Vulnerabilities

January 2025

Stay informed on the latest Microsoft security updates, critical patches, and zero-day vulnerability disclosures. Learn how to prioritize and implement security updates in your Microsoft environment.

Security Updates Vulnerability Patch Management
Read Full Article →

Infrastructure & Hands-On Labs

Launching an EC2 Linux Hands-On Lab

2025

A practical hands-on guide to launching and configuring EC2 Linux instances on AWS. Learn best practices for instance configuration, security, and management in a lab environment.

EC2 Linux Hands-On Lab
Read Full Article →

Want to Read More?

Visit my Medium profile for the complete collection of articles and stay updated with new technical write-ups.

Visit Medium Profile →

Want to discuss these topics or collaborate?

Get In Touch