Explore The TekBay Journal

A collection of stories about our people, our expertise, our innovations, and the evolving journey of our firm.

Layer 2 Attacks and Mitigation Techniques: DHCP Snooping for Network Protection

Layer 2 attacks, which target the OSI model’s data connection layer, pose significant dangers to local area networks (LANs). Attackers…

Exploring AWS Resilience Hub Capabilities

Resilience is the capability of any system to bounce back from unexpected problems like hardware failures or natural disasters. Obtaining…

Achieving Policy as Code with Kyverno in Kubernetes

Kubernetes environments thrive on flexibility and scalability, but these benefits also present challenges in maintaining consistency in governance, security, and compliance. …

Deploy DeepSeek-R1 LLM Locally with Ollama and Open WebUI

Large Language Models (LLMs) are transforming AI development, but running them locally can be challenging without the right tools. Available…

Implementing AWS Single Sign-On (SSO) Using AWS Managed Microsoft AD

AWS Single Sign-On (SSO), now known as IAM Identity Center, allows users to access both AWS and on-premises resources with…

How to Add HTTP Security Headers with Lambda@Edge and CloudFront

Web security has become more crucial than ever! HTTP Security Headers are your first line of defense to safeguard your website—or any…

Setting up AWS Managed Microsoft AD: Step-By-Step Guide

In Part 1 of our three-part blog series, “Connecting Your On-Premises Network to AWS,” we established a secure connection between the on-premises network…

How to Submit an AWS Consent to Assignment Request

When transferring an AWS account between two legally distinct entities, such as during a merger, acquisition, or divestiture, AWS requires…

Want to see how our expertise can work for you?
Get in touch with TekBay.