Just something one of my colleagues had written up and thought was interesting to share. I don’t take credit for it nor full responsibility of accuracy of it. Feel free to rebuttal.
Recently I had to present my personal thoughts on how we should implement a hybrid IAM scenario and the Cybersecurity considerations we should have when doing so. Attaching my slideshow with some thoughts. Let me know if any queries.
So I had a requirement where we wanted to have separate postfix instances which individually handles SMTP Relay traffic to redirect to Google Mail Relay & AWS SES. But we didn’t want to get an additional server to deploy postfix separately and add more servers to the farm. There are more than one ways to […]
I had missed posting this on the World Password Day but forgot to hit publish (my bad 😛 ) You know your passport – Your very physical identity which you put in a locker or in a safe place. Or while you are travelling you keep it with you at all times and don’t leave […]
2FA A Must!!! 2 Factor Authentication (2FA) / 2 Step Verification is a big push these days and works as an additional security in this ever increasing world of social engineering and cyber threats. Not just at your work but for your personal account as well. This should be turned on for every app you use […]