<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Marc Samuel Pabilona</title>
    <description>The latest articles on DEV Community by Marc Samuel Pabilona (@marcsamuel).</description>
    <link>https://dev.to/marcsamuel</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F800385%2Ff508d109-8002-49fb-b5f6-b1ecc72882b3.jpeg</url>
      <title>DEV Community: Marc Samuel Pabilona</title>
      <link>https://dev.to/marcsamuel</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/marcsamuel"/>
    <language>en</language>
    <item>
      <title>Core Takeaways on Philippines Cloud and Data Center Convention 2026 last March 26, 2026 at Shangrila Makati</title>
      <dc:creator>Marc Samuel Pabilona</dc:creator>
      <pubDate>Sun, 29 Mar 2026 19:14:52 +0000</pubDate>
      <link>https://dev.to/marcsamuel/core-takeaways-on-philippines-cloud-and-data-center-convention-2026-last-march-26-2026-at-379c</link>
      <guid>https://dev.to/marcsamuel/core-takeaways-on-philippines-cloud-and-data-center-convention-2026-last-march-26-2026-at-379c</guid>
      <description>&lt;p&gt;AI-Driven Infrastructure: A central theme was how Artificial Intelligence (AI) is reshaping data center design. Key discussions revolved around the need for higher power density, advanced cooling solutions (like liquid cooling), and revamped capacity planning to handle compute-intensive AI workloads.&lt;br&gt;
Expansion Beyond Metro Manila: Industry leaders highlighted the "untapped goldmines" in regional markets. There is a strategic push to build digital hubs outside the National Capital Region (NCR) to bridge the digital divide and create new economic powerhouses.&lt;/p&gt;

&lt;p&gt;Government &amp;amp; Policy Support: The convention underscored the impact of recent deregulation, such as allowing 100% foreign ownership and implementing the CREATE More Act to attract investment. The "Cloud-First" policy is evolving into a "Cloud-Smart" model as adoption matures.&lt;/p&gt;

&lt;p&gt;Sustainability &amp;amp; Resilience: With the Philippines being prone to natural disasters, designing climate-resilient data centers was a critical topic. This includes integrating renewable energy and ensuring operational continuity during extreme weather events.&lt;/p&gt;

&lt;p&gt;Growth Projections: Experts discussed the goal of reaching 1GW of capacity by 2030. Current projects aim to expand national capacity from 150MW to approximately 473MW in the near term.&lt;/p&gt;

&lt;p&gt;Strategic Risk Management: Challenges such as technical debt and the lack of infrastructure observability were addressed. There is a growing emphasis on FinOps to manage the cost volatility introduced by consumption-based AI and cloud models.&lt;/p&gt;

</description>
    </item>
    <item>
      <title>Kali GPT- AI Assistant That Transforms Penetration Testing on Kali Linux</title>
      <dc:creator>Marc Samuel Pabilona</dc:creator>
      <pubDate>Sun, 08 Jun 2025 19:22:22 +0000</pubDate>
      <link>https://dev.to/marcsamuel/kali-gpt-ai-assistant-that-transforms-penetration-testing-on-kali-linux-3kja</link>
      <guid>https://dev.to/marcsamuel/kali-gpt-ai-assistant-that-transforms-penetration-testing-on-kali-linux-3kja</guid>
      <description>&lt;p&gt;Kali GPT, a specialized AI model built on GPT-4 architecture, has been specifically developed to integrate seamlessly with Kali Linux, offering unprecedented support for offensive security professionals and students alike.&lt;br&gt;
Kali GPT represents a significant breakthrough in the integration of artificial intelligence with penetration testing, offering an intelligent co-pilot that fundamentally changes the cybersecurity workflow.&lt;br&gt;
As one industry expert noted, "In the rapidly evolving digital landscape, cybersecurity is not just a necessity; It is an art where proficiency defines success. Kali GPT emerges as the maestro's magic wand."&lt;br&gt;
The emergence of Kali GPT represents a significant milestone in democratizing cybersecurity expertise. This innovative AI assistant serves as an intelligent co-pilot for penetration testers, automatically generating payloads, explaining complex tools like Metasploit and Nmap, and suggesting appropriate exploits directly within the terminal environment.&lt;br&gt;
Kali GPT- AI Assistant For Kali Linux&lt;br&gt;
For seasoned professionals, this translates to dramatically reduced research time and enhanced productivity during security assessments.&lt;br&gt;
For beginners entering the cybersecurity field, Kali GPT acts as a digital mentor, translating complex technical concepts into accessible language. This democratization of ethical hacking knowledge makes advanced security testing techniques available to a broader audience.&lt;br&gt;
Educational institutions are particularly benefiting from this technology, as it provides interactive examples that enhance learning outcomes in cybersecurity programs.&lt;/p&gt;

&lt;p&gt;Original Thread and Credits: &lt;a href="https://www.facebook.com/groups/2600net/posts/4210193715870388/" rel="noopener noreferrer"&gt;https://www.facebook.com/groups/2600net/posts/4210193715870388/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;a href="https://cybersecuritynews.com/kali-gpt/?fbclid=IwY2xjawKywetleHRuA2FlbQIxMQBicmlkETF2bEMwWFg5RDk2d1pNWkJ3AR4sI1z8BV0Kpc9bRkF3wfoLQBpDKnKqOzCeE0SGxKNw1ClafZL7APsLi1hFVA_aem_i93Ecy02ucW6yb_qAj6OKA" rel="noopener noreferrer"&gt;https://cybersecuritynews.com/kali-gpt/?fbclid=IwY2xjawKywetleHRuA2FlbQIxMQBicmlkETF2bEMwWFg5RDk2d1pNWkJ3AR4sI1z8BV0Kpc9bRkF3wfoLQBpDKnKqOzCeE0SGxKNw1ClafZL7APsLi1hFVA_aem_i93Ecy02ucW6yb_qAj6OKA&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>IPTables Commands for Firewall Configuration</title>
      <dc:creator>Marc Samuel Pabilona</dc:creator>
      <pubDate>Tue, 01 Apr 2025 14:37:42 +0000</pubDate>
      <link>https://dev.to/marcsamuel/iptables-commands-for-firewall-configuration-3fda</link>
      <guid>https://dev.to/marcsamuel/iptables-commands-for-firewall-configuration-3fda</guid>
      <description>&lt;p&gt;Original Post:&lt;br&gt;
&lt;a href="https://medium.com/@paritoshblogs/iptables-commands-for-firewall-configuration-1c0da4b4838a" rel="noopener noreferrer"&gt;https://medium.com/@paritoshblogs/iptables-commands-for-firewall-configuration-1c0da4b4838a&lt;/a&gt; &lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>softwaredevelopment</category>
      <category>tutorial</category>
    </item>
    <item>
      <title>15 Git command line tips every developer should know</title>
      <dc:creator>Marc Samuel Pabilona</dc:creator>
      <pubDate>Tue, 01 Apr 2025 14:32:22 +0000</pubDate>
      <link>https://dev.to/marcsamuel/15-git-command-line-tips-every-developer-should-know-a4k</link>
      <guid>https://dev.to/marcsamuel/15-git-command-line-tips-every-developer-should-know-a4k</guid>
      <description>&lt;p&gt;URL: &lt;a href="https://appwrite.io/blog/post/15-git-cli-tips?utm_source=www.techopsexamples.com&amp;amp;utm_medium=newsletter&amp;amp;utm_campaign=kubernetes-pod-vs-container-security-contexts&amp;amp;_bhlid=e64456d4b797d8128bc4ab36866fb2049fd9d13f" rel="noopener noreferrer"&gt;https://appwrite.io/blog/post/15-git-cli-tips?utm_source=www.techopsexamples.com&amp;amp;utm_medium=newsletter&amp;amp;utm_campaign=kubernetes-pod-vs-container-security-contexts&amp;amp;_bhlid=e64456d4b797d8128bc4ab36866fb2049fd9d13f&lt;/a&gt; &lt;/p&gt;

</description>
      <category>git</category>
      <category>tutorial</category>
      <category>softwaredevelopment</category>
    </item>
    <item>
      <title>[Boost]</title>
      <dc:creator>Marc Samuel Pabilona</dc:creator>
      <pubDate>Mon, 06 Jan 2025 13:50:27 +0000</pubDate>
      <link>https://dev.to/marcsamuel/-5gm3</link>
      <guid>https://dev.to/marcsamuel/-5gm3</guid>
      <description>&lt;div class="ltag__link"&gt;
  &lt;a href="/cicube" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__org__pic"&gt;
      &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F8576%2F9780120e-85a9-4772-9d84-2d091045c2e3.png" alt="CICube" width="600" height="600"&gt;
      &lt;div class="ltag__link__user__pic"&gt;
        &lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F1381879%2Ff6bc4d53-0f0c-4fbb-9bde-8dd059564ade.png" alt="" width="600" height="600"&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
  &lt;a href="https://dev.to/cicube/mastering-kubectl-logs-a-devops-engineers-guide-4f6h" class="ltag__link__link"&gt;
    &lt;div class="ltag__link__content"&gt;
      &lt;h2&gt;Mastering kubectl logs - A DevOps Engineer's Guide&lt;/h2&gt;
      &lt;h3&gt;CiCube for CICube ・ Jan 3&lt;/h3&gt;
      &lt;div class="ltag__link__taglist"&gt;
        &lt;span class="ltag__link__tag"&gt;#kubernetes&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#devops&lt;/span&gt;
        &lt;span class="ltag__link__tag"&gt;#security&lt;/span&gt;
      &lt;/div&gt;
    &lt;/div&gt;
  &lt;/a&gt;
&lt;/div&gt;


</description>
    </item>
    <item>
      <title>Top Cloud Security Risks and Challenges</title>
      <dc:creator>Marc Samuel Pabilona</dc:creator>
      <pubDate>Sat, 21 Dec 2024 12:53:36 +0000</pubDate>
      <link>https://dev.to/marcsamuel/top-cloud-security-risks-and-challenges-c2j</link>
      <guid>https://dev.to/marcsamuel/top-cloud-security-risks-and-challenges-c2j</guid>
      <description>&lt;p&gt;Top Cloud Security Risks and Challenges&lt;br&gt;
Cloud technologies have reshaped how organizations function, delivering unparalleled scalability, flexibility, and cost efficiency. Yet, these advantages come with their own set of security challenges that, if unaddressed, can undermine their benefits. From data breaches to compliance issues, navigating the complexities of cloud security requires both foresight and robust strategies. Let's discuss the top security risks organizations face in cloud environments.&lt;/p&gt;




&lt;ol&gt;
&lt;li&gt;Inadequate Incident Response
One of the most critical challenges in cloud security is the lack of robust incident response strategies tailored for cloud environments. Many organizations rely on traditional methods that are ill-suited to address the dynamic nature of the cloud.
Why It's a Problem:
Cloud incidents, such as unauthorized access or data breaches, require real-time detection and rapid mitigation.
Organizations often lack the specialized tools or expertise to investigate and contain cloud-specific threats effectively.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Practical Solutions:&lt;br&gt;
Develop a cloud-focused incident response plan that includes predefined workflows for different scenarios.&lt;br&gt;
Invest in automated detection tools like SIEM (Security Information and Event Management) systems that integrate with cloud platforms.&lt;br&gt;
Train incident response teams to handle cloud-specific threats and conduct regular drills to ensure preparedness.&lt;/p&gt;




&lt;ol&gt;
&lt;li&gt;Sprawl
The ease of deploying virtual machines (VMs), databases, and other workloads in the cloud can lead to an unmanageable proliferation of resources, known as sprawl. This creates significant challenges in tracking and securing all assets.
Why It's a Problem:
Sprawl results in blind spots where unmanaged resources go unnoticed, leaving them vulnerable to attacks.
Lack of centralized visibility makes compliance and governance more difficult.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Practical Solutions:&lt;br&gt;
Implement a cloud asset management solution to maintain an up-to-date inventory of all resources.&lt;br&gt;
Establish governance policies that define who can deploy resources and under what conditions.&lt;br&gt;
Use tagging and categorization to organize cloud resources effectively for better monitoring and reporting.&lt;/p&gt;




&lt;ol&gt;
&lt;li&gt;Securing Hybrid and Multicloud Environments
Many organizations operate in hybrid or multicloud environments, combining on-premises systems with multiple cloud providers. Ensuring consistent security across such diverse infrastructures is a significant challenge.
Why It's a Problem:
Different platforms have unique security configurations, making standardization difficult.
Maintaining visibility and control over data and workloads across environments requires extensive resources.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Practical Solutions:&lt;br&gt;
Use centralized management tools that support hybrid and multicloud security monitoring.&lt;br&gt;
Standardize security policies and configurations across all environments.&lt;br&gt;
Employ encryption and access controls that function consistently across platforms to protect data integrity.&lt;/p&gt;




&lt;ol&gt;
&lt;li&gt;Shadow IT
Shadow IT refers to technology solutions implemented without the knowledge or approval of the IT department. In cloud environments, this often includes unapproved applications or workloads.
Why It's a Problem:
Shadow IT bypasses established security protocols, leaving vulnerabilities exposed.
Without oversight, these workloads are harder to monitor, manage, and secure.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Practical Solutions:&lt;br&gt;
Educate employees on the risks of deploying unapproved solutions and promote a culture of compliance.&lt;br&gt;
Deploy CASBs (Cloud Access Security Brokers) to detect and manage shadow IT resources.&lt;br&gt;
Create an approval process that allows teams to deploy tools within the security framework.&lt;/p&gt;




&lt;ol&gt;
&lt;li&gt;Third-Party Risks
Organizations increasingly rely on third-party vendors for cloud services, adding layers of complexity to their security landscape.
Why It's a Problem:
Third-party providers may have security vulnerabilities that directly impact your organization.
Lack of visibility into vendor security practices increases risks.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Practical Solutions:&lt;br&gt;
Conduct regular third-party risk assessments and require vendors to comply with your organization's security standards.&lt;br&gt;
Establish clear contractual agreements outlining security responsibilities and breach response protocols.&lt;br&gt;
Monitor third-party activity using tools that provide detailed access logs and alerts.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Technical Security Debt
Technical security debt arises when security considerations are deprioritized during rapid innovation cycles, leading to vulnerabilities that require more time and resources to address later.
Why It's a Problem:
Unresolved vulnerabilities accumulate, creating significant risks over time.
Fixing these issues later often requires substantial effort, delaying other projects.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Practical Solutions:&lt;br&gt;
Integrate security into the development lifecycle with DevSecOps practices.&lt;br&gt;
Regularly audit and remediate vulnerabilities to prevent debt from growing.&lt;br&gt;
Prioritize addressing high-risk issues immediately to minimize long-term impacts.&lt;/p&gt;




&lt;ol&gt;
&lt;li&gt;Resource Limitations
Many organizations face constraints in budget, staffing, and expertise, which can hinder effective cloud security management.
Why It's a Problem:
Limited resources lead to gaps in monitoring, incident response, and overall security.
Organizations may struggle to adopt advanced security tools or hire specialized talent.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Practical Solutions:&lt;br&gt;
Leverage managed security services (MSSPs) to supplement in-house capabilities.&lt;br&gt;
Automate routine security tasks to reduce the burden on IT teams.&lt;br&gt;
Invest in employee training to upskill existing staff in cloud security practices.&lt;/p&gt;




&lt;ol&gt;
&lt;li&gt;Rapid Evolution of Technologies
Cloud services and security practices evolve rapidly, and failing to keep pace leaves organizations vulnerable to emerging threats.
Why It's a Problem:
Outdated configurations and practices increase exposure to attacks.
Adopting new technologies without proper evaluation can introduce additional risks.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Practical Solutions:&lt;br&gt;
Stay informed about advancements in cloud technologies and security trends through industry publications and training.&lt;br&gt;
Regularly review and update security configurations to align with best practices.&lt;br&gt;
Partner with cloud providers to leverage their expertise and integrate their latest security features.&lt;/p&gt;




&lt;p&gt;Conclusion&lt;br&gt;
Cloud security is a critical component of every organization's digital strategy, but are you addressing the real challenges? Are your tools, policies, and teams ready to respond effectively to modern threats? Tackling these risks requires more than theoretical frameworks; it demands practical, real-world strategies.&lt;br&gt;
Start by integrating advanced security tools tailored specifically to your cloud environment. Have you conducted an honest evaluation of whether your team has the expertise needed for effective deployment and use? At the same time, ensure continuous employee education so everyone understands the importance of their role in maintaining security. Are your employees aware of how their actions - even small ones - can impact your organization's risk profile?&lt;br&gt;
Organizations that proactively address these challenges unlock the full potential of cloud technologies while safeguarding their assets. Regularly ask yourself: Are your governance frameworks clear and consistent? Are you staying agile by updating processes to match emerging threats? Building a culture of accountability where everyone takes ownership of security is essential to staying prepared in an ever-evolving digital landscape.&lt;/p&gt;

&lt;p&gt;Original Thread: &lt;a href="https://www.linkedin.com/pulse/top-cloud-security-risks-challenges-secureb4-vc1tc/" rel="noopener noreferrer"&gt;https://www.linkedin.com/pulse/top-cloud-security-risks-challenges-secureb4-vc1tc/&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
    <item>
      <title>ISC2 Philippines Chapter - Year End Party at Microsoft Office Makati</title>
      <dc:creator>Marc Samuel Pabilona</dc:creator>
      <pubDate>Wed, 18 Dec 2024 18:01:52 +0000</pubDate>
      <link>https://dev.to/marcsamuel/isc2-philippines-chapter-year-end-party-at-microsoft-office-makati-4kch</link>
      <guid>https://dev.to/marcsamuel/isc2-philippines-chapter-year-end-party-at-microsoft-office-makati-4kch</guid>
      <description>&lt;p&gt;One of my IT Community Group in the Philippines that focuses on Cybersecurity (Awareness,Governance,Risk and Compliance) held the year end party at Microsoft Office,One Ayala, Makati last December 11, 2024. &lt;/p&gt;

&lt;p&gt;CTTO: We were very fortunate to be joined by fellow CISSP and DICT Undersecretary Jeffrey Ian Dy who gave a very inspiring message on collaboration and non-exclusivity. We were also honored by the presence of Ricson Singson Que, the very first Filipino recipient of the ISC2 Security Leadership Awards. Special thanks to Microsoft and Cloud4C Services for sponsoring the event, the ISC2PH Board for organizing the event, and to all those who attended!&lt;/p&gt;

&lt;p&gt;Images from ISC2 PH: &lt;a href="https://www.facebook.com/isc2ph/posts/pfbid02SkGgQA5sRL2TQP7xjWtWewfzoXqKMaZqqXhr5CkuE4g1Hn929RTRxuMXpiUzUuBNl" rel="noopener noreferrer"&gt;https://www.facebook.com/isc2ph/posts/pfbid02SkGgQA5sRL2TQP7xjWtWewfzoXqKMaZqqXhr5CkuE4g1Hn929RTRxuMXpiUzUuBNl&lt;/a&gt; &lt;/p&gt;

&lt;p&gt;Images from Linkedin: &lt;a href="https://www.linkedin.com/posts/isc2-philippines-chapter_photodump-from-isc2phs-year-end-gmm-held-activity-7272799160150429696-VmoB?utm_source=share&amp;amp;utm_medium=member_desktop" rel="noopener noreferrer"&gt;https://www.linkedin.com/posts/isc2-philippines-chapter_photodump-from-isc2phs-year-end-gmm-held-activity-7272799160150429696-VmoB?utm_source=share&amp;amp;utm_medium=member_desktop&lt;/a&gt;&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
