Cloud Whisperer Blog

Taking Down Cybercriminals: A Global Effort to Combat Phishing-as-a-Service

In a major victory against cybercrime, the notorious ’16shop’ phishing-as-a-service (PaaS) platform has been dismantled through a collaborative effort led by INTERPOL [https://www.interpol.int/en/News-and-Events/News/2023/Notorious-phishing-platform-shut-down-arrests-in-international-police-operation]. This international operation resulted in the arrest of the platform’s operator and facilitators in Indonesia and Japan,...

Uncharted Trails: Turning Challenges into Adventure

  Chapter 1: Leaving Singapore to Manali We were two motorcycle enthusiasts who had planned a 12-day trip to Manali, Leh, and Srinagar to show our solidarity towards Sadhguru’s “Save the Soil” campaign [https://consciousplanet.org/]. Sadhguru’s “Save the Soil” campaign is...

Encryption of “Data in Use”

Encryption is a critical security measure for protecting data at rest and in transit, but what about data in use? Encrypting data in use, also known as “in-memory encryption,” is a technique for protecting data while it is being processed...

Enterprise architect’s Challenges

Enterprise architects face a variety of challenges in their roles. Here are some of the most significant ones: Understanding Business Strategy: One of the biggest challenges is understanding and aligning with the business strategy. The enterprise architect must ensure that...