• 13th July 2025
Istio Network Policies

A quick look at configuring network policies and authorization policies in Istio

  • 8th December 2024
Dockerfile Linting

Let’s look at linting our Dockerfiles with hadolint

  • 8th December 2024
Debug Docker images with Dive

Let’s look at using Dive to debug docker images

  • 17th November 2024
CircleCI OPA Policies

Help protect against insider threats with OPA policies

  • 29th September 2024
Show Gitleaks Code Snippet

Quick bash script to retrieve the surrounding code snippet from gitleaks fingerprint

  • 9th March 2024
Security Cert Study Notes

My study notes for a security cert

  • 18th February 2023
Using AWS Vault with SSO

Let’s look at using aws-vault with SSO

  • 24th September 2022
SNS Data Protection Example

Automatically scan for PII by using the SNS message data protection feature

  • 17th April 2022
Using Redshift in a private subnet

Looking at different ways we can connect Redshift and Lambdas inside of a private subnet to SecretsManager

  • 5th March 2022
Terraform - Place your EC2 instance in a private subnet

Looking at different ways we can connect Redshift and Lambdas inside of a private subnet to SecretsManager

  • 15th December 2021
How to restrict access to a single S3 bucket

We look at how to create a policy for giving full access to a single S3 bucket in AWS

  • 6th November 2021
Magento Tips - Pentest with sqlmap

How do I test my magento site for common sql injection vulnerabilities

  • 31st October 2021
Magento Tips - Solve .user.ini issue

How to solve the .user.ini issue raised by the Magento Security Scan

  • 26th September 2021
Docker Tips - UFW

By default docker will override UFW, it is important to be aware of this so that you do not expose your docker containers to the world.

  • 4th September 2021
Prevent traversal attacks in Magento 2

As a rule of thumb, never roll out your own security. If you have a modern framework at your disposal then it is much easier to follow their best practice.

  • 28th August 2021
PHP Security Tips - open_basedir

This feature takes seconds to configure, and adds a layer of protection in the case of a directory traversal vulnerability.