Skip to main content

About Us

About DefendTheCloud

Welcome to DefendTheCloud. This blog was created with one simple goal in mind: to make cybersecurity and cloud security easier to understand, practical to apply, and responsible in its use.

We are cybersecurity enthusiasts who are actively learning, experimenting, and growing in this rapidly evolving field. Like many beginners, we once found cybersecurity overwhelming due to complex terminology, scattered resources, and explanations that assumed prior expertise. DefendTheCloud was born out of that frustration and the desire to create a space that explains security concepts clearly without unnecessary complexity.

Cyber threats today evolve faster than ever. Staying informed is no longer optional for students, professionals, or even everyday internet users. Through this platform, we aim to help readers build strong foundational knowledge while developing a security-first mindset.

---

Why DefendTheCloud Exists

Cybersecurity education often feels inaccessible to newcomers. Many resources are either too shallow to be useful or too advanced to be approachable. We wanted to bridge that gap by sharing content that is beginner-friendly while still being technically accurate and relevant.

DefendTheCloud is designed as a learning-oriented blog. The focus is on understanding how security works, why vulnerabilities exist, and how defensive practices can reduce risk in real-world environments. Our content is created for educational and awareness purposes only, with an emphasis on ethical and responsible security practices.

---

What We Share

At DefendTheCloud, we publish well-researched articles and guides related to cybersecurity and cloud security. Topics covered on this blog include:

  • Cybersecurity fundamentals and best practices
  • Vulnerability awareness and secure system design
  • Cloud security concepts and architecture
  • Network and endpoint security basics
  • Incident response and digital forensics concepts
  • Cybersecurity news, trends, and learning resources

All content is written with the intention of educating readers, improving awareness, and encouraging safe and ethical use of technology. We do not promote illegal activities or misuse of security knowledge.

---

Our Learning Philosophy

We believe cybersecurity is not just a technical skillset. It is a mindset built on curiosity, responsibility, and continuous learning.

Learning never stops in security. Sharing knowledge strengthens the community. Defending digital systems responsibly helps create a safer internet for everyone. These principles guide every article we publish on DefendTheCloud.

---

Who This Blog Is For

DefendTheCloud is intended for a wide audience, including:

  • Students exploring cybersecurity and cloud technologies
  • IT professionals refreshing or expanding their security knowledge
  • Developers who want to write and deploy more secure applications
  • Security learners seeking clear explanations without unnecessary jargon
  • Individuals who want to better protect their digital presence

Whether you are learning for career growth or personal awareness, this blog aims to provide value through clarity and practical understanding.

---

About the Authors

DefendTheCloud is maintained by contributors who are actively involved in learning and practicing cybersecurity concepts. The blog reflects our ongoing journey in understanding security challenges, tools, and defensive strategies. Any opinions expressed are personal and based on learning experiences, research, and publicly available information.

---

Looking Ahead

This blog is continuously evolving. As DefendTheCloud grows, we plan to introduce more in-depth guides, practical explanations, and curated resources to support learners at different stages of their cybersecurity journey.

We appreciate every reader who takes the time to learn with us. Our aim is to contribute positively to the cybersecurity community by promoting awareness, ethical learning, and responsible defense practices.

Thank you for being part of DefendTheCloud.


Sarang Shigwan

Atharva Kanawade



Popular posts from this blog

Cloud-Native Architectures: A Complete Guide to Modern Application Development

  What are Cloud-Native Architectures? Cloud-native architectures are a paradigm shift in application creation, deployment, and architecture. While conventional applications execute on hardware servers, cloud-native applications are designed to leverage the capability of cloud-computing platforms. Cloud-native is by the Cloud Native Computing Foundation (CNCF) "empowering organizations to create and run scalable applications in contemporary, dynamic environments such as public, private, and hybrid clouds." This allows organizations to respond in real time to the changes in the market with high availability and performance. Key Elements of Cloud-Native Architectures 1. Microservices Architecture Microservices break up by-large apps into smaller, independent services with common data through well-defined APIs. A single service encapsulates a specific business capability and can be written, executed, and scaled separately. Real-World Example: Netflix has over 700 micro...

Coupang 2025 Data Breach Explained: Key Failures and Modern Security Fixes

A significant data breach occurred at Coupang, a major online shopping platform in Asia, in December 2025. This incident has resulted in millions of customers’ data being accessed with unauthorized access to names, contact numbers, details of card payments and order history. As industrial institutions continue to migrate towards a cloud-native application platform along with high-cycle DevOps methodologies, incidents like this demonstrate one critical fact; security should never be an afterthought. Coupang serves as a case study for developers, cloud engineers and security personnel on how things could be executed successfully. This article will examine what went wrong during this incident, how could attackers have taken advantage of vulnerabilities within Coupang’s systems, and how with compliant security methodologies such activities could be avoided in the future. What Happened During the Coupang Breach? According to public information and cybersecurity reports, attackers stole de...

Supply Chain Security: Critical Defense Strategies After SolarWinds and MOVEit Attacks

  The world of the cybernetic era was forever changed when the SolarWinds' Orion platform was compromised by hackers in 2020 and over 18,000 organizations worldwide were compromised. SolarWinds placed the number of possibly impacted companies at up to 18,000 but only around 100 have been confirmed to have been actively targeted. Flash forward to 2023, and we witnessed yet another devastating supply chain attack via Progress Software's MOVEit file transfer software, affecting more than 600 organizations worldwide, making it one of the biggest supply chain attacks to be seen to date. These attacks are not isolated events. By 2025, Gartner estimates that 45 percent of all organizations globally will have been the victim of a software supply chain attack, a three-fold increase from 2021. The warning is clear: security perimeters in the classic sense are no longer effective when threats can be injected through trusted vendor relationships. Understanding the Modern Supply Chain Threa...