Sourav is a Senior Consultant in Security Practice at Workmates Core2Cloud with a strong background in cybersecurity. He is also an AWS community builder member. He leverages his deep industry knowledge to design and implement tailored security solutions for a diverse range of clients.
Introduction Modern cloud architectures often involve multiple VPCs to separate concerns, improve security, and maintain organizational boundaries. However, this segmentation creates challenges when services need to communicate across VPC boundaries. In this post, I’ll walk through a proof of concept (POC) that demonstrates how AWS VPC Lattice can elegantly solve this problem for a payment…
Read article
In today’s cloud-native environments, securing file storage systems and APIs is critical for preventing data breaches, malware infections, and API abuse. Let’s take a closer look at some of the leading vendors in File Storage Security (FSS) and API scanning tools, including their features, strengths, unique capabilities, and deployment scenarios. Trend Micro AMAAS (Application and…
Read article
As organizations increasingly migrate their workloads to the cloud, securing access to critical applications and resources becomes paramount. Traditionally, Virtual Private Networks (VPNs) have been the go-to solution for secure remote access. However, as cloud environments and remote workforces grow, limitations in traditional VPNs have become more apparent. AWS Verified Access, a cloud-native solution designed…
Read article
Cloud Security Posture Management (CSPM) is a crucial aspect of ensuring the security of cloud computing environments. As more businesses migrate their applications and data to the cloud, it becomes crucial to maintain a strong security posture to protect sensitive information and maintain regulatory compliance. Here are some key reasons highlighting the importance of Cloud…
Read article