mTLS and CDN: Ideal use case, missed opportunity.
Exploring a killer, yet unrealised, use case for mTLS in content delivery networks.
Exploring a killer, yet unrealised, use case for mTLS in content delivery networks.
Whether Redis or Memcached, AWS Elasticache is an essential component in a scalable architecture.
An important extension of MACH principles and a fun play on words - why we should strive for MACH0
A close call with a subdomain takeover highlights the importance of DNS hygiene
Why you should still be using www. in your web address.
A few simple steps to take, if you're having unexpected issues with your DNS changes.
Exploring JWTs. What they are, where they're used, and what needs to be considered in their implementation.
Penetration test reports often highlight insecure responses. Let's have a look at how we can secure their responses, with HTTP Headers and more.
Absolutely essential for businesses of any size, AWS Organizations enhances and simplifies security, controls and observabilty for All AWS Users
Trying to use AWS Cloudwatch to implement a "kill switch" that automatically disables CloudFront distribution if the bandwidth cost exceeds a specified threshold.
How to use Netlify edge functions to password-protect your staging site on the free plan.
Access the command line of ECS containers hosted on EC2 or Fargate using Session Manager.
Setting up an Identity Provider for AWS IAM to ensure secure authentication using GitLab as an example.
Configuring NGINX to protect a login endpoint with rate limiting to mitigate brute-force attacks.