2025
- 18 Mar Building a Resilient Security Posture with AWS Security Hub and GuardDuty
- 13 Mar Real-Time Intrusion Detection Using AWS GuardDuty and Lambda
- 11 Feb Real-Time Log Analysis with AWS Kinesis Data Streams and Lambda
- 06 Jan Active Deception Techniques Using Honeytokens on AWS
2023
- 13 Oct Open-Source Intelligence (OSINT) Tools: A Guide to Commonly Available Free Resources
- 02 Oct Implementing security for container-based environments
- 02 Jun DevOps Meets Security - How the Right Tools and Processes Can Boost Your Software Chain
- 02 Jun Beyond Compliance: How DevSecOps Can Help You Stay Ahead of Regulatory Standards
- 12 May Things to consider when migrating from traditional architecture to serverless
- 02 May Leveraging Snyk.io for Improved Security Compliance and Reduced Vulnerable Footprint
- 29 Apr Secure Your Cloud with Confidence: A DevSecOps Approach to Cloud Security
- 13 Apr The Human Element in Cybersecurity: Leveraging AWS Cloud Security and DevSecOps to Mitigate Human Vulnerabilities
- 11 Apr The Power of Prioritization: 5 Actionable Steps to Secure Your SoC
- 06 Apr Dont get caught without a Risk Management Plan
- 31 Jan Attacker common toolchain
- 19 Jan Automating security compliance checks in a CI/CD pipeline
- 12 Jan The benefits and challenges of implementing serverless architecture
2022
- 19 Oct Security Best Practices for Companies Operating Public-Facing Websites
- 19 Oct Remaining Anonymous Online: Protecting Your Privacy
- 19 Oct Public sources of security artifacts
- 19 Oct How organizations can prepare for, mitigate, and respond to common threats
- 19 Sep The Internet and Personal Information: A Double-Edged Sword
- 19 Aug How Threat Modeling can help organizations
- 19 Jul 10 tips to secure yourself online
- 19 Jun Common threat vectors in 2022 and how to mitigate them
- 19 May Embed security in as early as possible using devsecops
- 19 Apr Social engineering and how organizations can prepare for, mitigate, and respond to these threats
- 19 Mar optimize your CI/CD pipeline for cloud and containerized workloads
- 19 Feb Phishing and how organizations can prepare for, mitigate, and respond to these threats
- 19 Feb How can organizations prepare for, mitigate, and respond to modern threats
- 19 Jan Understanding the importance of security in DevOps
2000
- 18 Jan Disclaimer