top of page

Search


Ingress Controller - CVE-2025-1974: A Critical Vulnerability You Need to Address
Cloud security is constantly changing, and with these changes comes the need to protect our clusters and sensitive data from...
Apr 4


How to Enable DNSSEC in your domains
The Domain Name System Security Extensions (DNSSEC) is a set of specifications that extend the DNS protocol by adding cryptographic...
Jan 2, 2024


Security announcements at AWS Re: Invent 2023
AWS re:Invent is AWS’s end-of-the-year event where the latest developments of AWS Cloud microservices are announced. Our team had the...
Dec 20, 2023


How to protect your SSH and SCP Connections with AWS Sessions Manager in 4 simple steps
In certain scenarios, establishing secure SSH or SCP connections with EC2 instances within our protocol becomes necessary. AWS Sessions...
Oct 13, 2023


Secure Your Data with SOC 2 Compliant Solutions
In today's digital landscape, where data breaches and cyber threats have become increasingly sophisticated, protecting sensitive...
Sep 14, 2023


How to add 2FA to our SSH connections with Google Authenticator
In this Teratip, we will learn how to configure the Google Authenticator PAM module to our SSH (Secure Shell) server connections to add...
Aug 16, 2023


Prevent (and save money in the process) Security Hub findings related to old ECR images scanned
Checking Security Hub after setting it up, I found a ton of findings related to old ECR images I had in my repo. If you never did it, the...
Apr 5, 2023


The Importance of Cloud Security for the Finance Sector
Financial institutions of all sizes increasingly view services provided by cloud service providers as an important component of their...
Mar 30, 2023


Streamlining Security with Amazon Security Hub: A where to start Step-by-Step Guide
Amazon Security Hub is a security service offered by Amazon Web Services (AWS) that aggregates and prioritizes security findings from...
Feb 7, 2023


Boost AWS Security with Trivy Vulnerability Scanning
As we already know, AWS counts with a useful tool to scan our images for vulnerabilities when we push them to our registry. On this...
Jan 25, 2023
bottom of page