Discover Paralus, a controlled and audited access to Kubernetes

Discover Paralus, a controlled and audited access to Kubernetes

Paralus empowers companies by providing a centralized Kubernetes user authentication and authorization tool as well as audit logs.

Deploy Falco with Falcosidekick on ECS

Deploy Falco with Falcosidekick on ECS

Secure your AWS ECS cluster with Falco. This article explains how to implement Falco with falcosidekick on your ECS cluster with EC2 launch type.

How to use honey tokens effectively to detect intrusion in AWS

How to use honey tokens effectively to detect intrusion in AWS

Explore the effectiveness of Honey Tokens in AWS. Learn how to deploy and strategically position them to early detect potential attackers.

Easily plug any webapp to any IdP using oauth2-proxy

Easily plug any webapp to any IdP using oauth2-proxy

Learn how to implement an oauth2-proxy on your kubernetes cluster for secure and easy access to your apps with SSO.

Authenticate your users with an AWS Application Load Balancer

Authenticate your users with an AWS Application Load Balancer

Learn how to authenticate your users to your applications with an Application Load Balancer and AWS Cognito.

IAM Identity Center: why you should get rid of IAM Users

IAM Identity Center: why you should get rid of IAM Users

Do you use IAM users to manage the employees? Let’s see why it is a huge mistake and why you should replace it with AWS IAM Identity Center.

An introduction to Policy As Code

An introduction to Policy As Code

This article will give you guidance on how to build a Policy As Code system that encourages teams to adopt it while not affecting their productivity.

How to pentest AWS Cognito? Attack and remediation explained

How to pentest AWS Cognito? Attack and remediation explained

So, you are pentesting a website, and it uses AWS Cognito. But you don’t know what is this service nor how to abuse it? Let's see how to pwn it!

Enable AWS GuardDuty to detect suspicious activity

Enable AWS GuardDuty to detect suspicious activity

Learn how to enhance your cloud security posture with GuardDuty's intelligent threat detection capabilities and safeguard your AWS infrastructure.