-
AWS re:Invent 2025: insights and key takeways
07/12/2025 · 34 min read · aws re:invent conference cybersecurity cloud ai agentic quantum-computing networking computing storage serverless ·
In this article, I take you with me to the AWS re:Invent 2025 conference I attended in Las Vegas. You’ll see an overview of the sessions I attended along with the key takeaways from this intense week of learning, practising …
Read More -
Automating the protection of a network from denial of service with RTBH, NetFlow, goBGP and FastNetMon

In this article, I will introduce Remotely-Triggered Black Hole (RTBH), a technology based on the Border Gateway Protocol (BGP) routing protocol and designed to provide the ability to block unwanted network traffic in order to …
Read More -
Implementing application filtering with nftables and Suricata on Debian
05/02/2023 (updated on 05/10/2024) · 14 min read · cybersecurity networking firewall applicationfiltering nftables suricata debian ·
In this article, I invite you to discover or rediscover application filtering, with some help to set up application filtering with a netfilter firewall using the nftables utility and the Suricata tool on the Debian GNU/Linux …
Read More -
flyingroutes: a faster alternative to traceroute
16/12/2022 (updated on 13/09/2024) · 12 min read · cybersecurity networking flyingroutes traceroute ·
In this article, I introduce a network diagnostic tool I developed: flyingroutes. The goal is to provide an efficient way to determine the nodes located on a network communication path through a faster alternative to the …
Read More -

In this article, I will dissect the concept of Virtual Private Network (VPN) using the Internet Protocol security (IPsec) protocol. The goal is to help you better understand the various steps involved in setting up an IPsec …
Read More