Terraform state locking with S3 and DynamoDB explained

Introduction 

When managing infrastructure-as-code using Terraform, the state file is a key component, as it keeps track of what resources are associated with your configuration and how they are configured relative to one another. Teams will suffer from corrupted state and conflicting updates if they are left on their own to store and coordinate state.As teams compete for overall dominance, resources are neglected.  Continue reading “Terraform state locking with S3 and DynamoDB explained”

Technical Post-Incident Review: Cloudflare Global Outage (18 November 2025 )

Introduction

An outage caused by Cloudflare on November 18, 2025, disrupted access to a number of popular websites and other online services. Because the company serves millions of websites with DNS, content delivery, routing, bot detection, and security filtering, an internal disruption quickly spread noticeable problems throughout the internet.

This review describes what transpired, why it happened, what users went through, and what organisations can take away from the event. The essential technical details are covered in an easy- to-follow manner. Continue reading “Technical Post-Incident Review: Cloudflare Global Outage (18 November 2025 )”

A Practical Guide to Applying CIS Benchmarks for System Hardening

Introduction

In today’s world, where cyber threats keep evolving every day, system security is no longer optional – it’s a must. Many organizations depend on trusted frameworks to secure their infrastructure. One such framework is the CIS Benchmark, created by the Center for Internet Security (CIS).

CIS Benchmarks are detailed recommendations that help you configure operating systems, servers, databases, and applications securely. Whether you’re managing a Linux server or a Windows workstation, these benchmarks give you a clear checklist of what to configure and why it matters.

This blog explains what CIS Benchmarks are, why they’re important, when you should use them, and how they can improve your system security  with some real examples from implementation experience. Continue reading “A Practical Guide to Applying CIS Benchmarks for System Hardening”