Avik ChowdhuryAutomated detection of Risky Permissions in Kubernetes ClustersKubernetes uses an authorization module called Role-Based Access Control (RBAC) to set the utilization permissions for the different…2 min read·Apr 8, 2021----
Avik ChowdhuryIncident Response in the Cloud (AWS)Part 1- Handling AWS Abuse Notifications{This blog series is an effort from me to raise awareness about IR and threat detection in the Cloud. In this blog post we will be…4 min read·Sep 25, 2019----