Evaluating and securing your Kubernetes infrastructure with kube-bench
Controlling access to resources with Cognito groups and IAM roles
Why you need Interactive Application Security Testing (IAST) 🔒
Best Practices for Cybersecurity in the Digital Age
Autenticação e Autorização de uma ASP .NET Web API com Keycloak
What's new and noteworthy on AWS - Summer 2023 edition
The Complete Guide to Becoming a Web Developer: Part 8
Malware Detection with Machine Learning: A Powerful Approach to Combat Cyber Attacks
DefaultAzureCredential with certificate-based authentication: how to make it work
Set Up a Self Hosted Outline VPN with Amazon LightSail in 5 steps.
Tesla’s Massive 2023 Data Breach - Could Chaos Security Engineering Have Prevented This?
A Go net.Listen() function that includes SSO, AuthZ, sessions Management and Anycast
Publish Azure DevOps Extensions using Azure Workload Identity
Programmatically reacting to S3 bucket external access exposures
Efficient Data Management with Frozen Shards Decider in Elastic-search
Managing Multiple AWS Accounts with Organizations and Control Tower
AWS Network Mastery: Shielding Your Instances with Private Subnets
KubeClarity in Action - Image Scanning as part of your CI workflow
5 Essential Data Privacy Regulations for Businesses to Know in 2023
Serving Content from S3 Only to Authenticated Users
Use Case: Monitor SSH attempts for your EC2 Instance
Secure Code Review Best Practices [cheat sheet included]
Scanning and remediating vulnerabilities with Grype
Migrating users without downtime in your service (The Lazy Migration Strategy)
Protecting Your Passwords: The Silent Threat Lurking on Zoom Calls
Vault Associate Certification (Part 0): Hello World
Does a one-man project need a formal project management process?
Safeguarding Your Digital World: The Imperative of Data Security
5 Strategies for Strengthening MQTT Infrastructure Security
SAML vs OAuth: Choosing the right protocol for authentication
Guide to Generating SSL Certificates Using OpenSSL for Web Applications
Install free SSL certificate on your server using Certbot
Returning customized content based on location with S3 Object Lambda
Demystifying CORS: Understanding How Cross-Origin Resource Sharing Works
Amazon CodeGuru Reviewer: already time for retirement?
Desvendando a criptografia do Firefox e resgatando senhas salvas!
7 Must-Do Security Best Practices for your AWS Account