top of page
Search
Jan 2, 2024
How to Enable DNSSEC in your domains
The Domain Name System Security Extensions (DNSSEC) is a set of specifications that extend the DNS protocol by adding cryptographic...
Dec 20, 2023
Security announcements at AWS Re: Invent 2023
AWS re:Invent is AWS’s end-of-the-year event where the latest developments of AWS Cloud microservices are announced. Our team had the...
Oct 13, 2023
How to protect your SSH and SCP Connections with AWS Sessions Manager in 4 simple steps
In certain scenarios, establishing secure SSH or SCP connections with EC2 instances within our protocol becomes necessary. AWS Sessions...
Sep 14, 2023
Secure Your Data with SOC 2 Compliant Solutions
In today's digital landscape, where data breaches and cyber threats have become increasingly sophisticated, protecting sensitive...
Aug 16, 2023
How to add 2FA to our SSH connections with Google Authenticator
In this Teratip, we will learn how to configure the Google Authenticator PAM module to our SSH (Secure Shell) server connections to add...
Apr 5, 2023
Prevent (and save money in the process) Security Hub findings related to old ECR images scanned
Checking Security Hub after setting it up, I found a ton of findings related to old ECR images I had in my repo. If you never did it, the...
Mar 30, 2023
The Importance of Cloud Security for the Finance Sector
Financial institutions of all sizes increasingly view services provided by cloud service providers as an important component of their...
Feb 7, 2023
Streamlining Security with Amazon Security Hub: A where to start Step-by-Step Guide
Amazon Security Hub is a security service offered by Amazon Web Services (AWS) that aggregates and prioritizes security findings from...
Jan 25, 2023
Boost AWS Security with Trivy Vulnerability Scanning
As we already know, AWS counts with a useful tool to scan our images for vulnerabilities when we push them to our registry. On this...
Jan 18, 2023
Keep your S3 buckets safe in transit and in rest
When using AWS S3, our favorite AWS service for keeping static files, we have two ways of uploading objects, by HTTP or HTTPS , when we...
bottom of page