mTLS and CDN: Ideal use case, missed opportunity.
Exploring a killer, yet unrealised, use case for mTLS in content delivery networks.
Exploring a killer, yet unrealised, use case for mTLS in content delivery networks.
An important extension of MACH principles and a fun play on words - why we should strive for MACH0
A close call with a subdomain takeover highlights the importance of DNS hygiene
Why you should still be using www. in your web address.
A few simple steps to take, if you're having unexpected issues with your DNS changes.
Exploring JWTs. What they are, where they're used, and what needs to be considered in their implementation.
How, why and whether to obfuscate your frontend code
Penetration test reports often highlight insecure responses. Let's have a look at how we can secure their responses, with HTTP Headers and more.
Absolutely essential for businesses of any size, AWS Organizations enhances and simplifies security, controls and observabilty for All AWS Users
Trying to use AWS Cloudwatch to implement a "kill switch" that automatically disables CloudFront distribution if the bandwidth cost exceeds a specified threshold.
Receiving form submissions with Netlify is so mind-numbingly simple, I just had to write about it.
How to use Netlify edge functions to password-protect your staging site on the free plan.
Access the command line of ECS containers hosted on EC2 or Fargate using Session Manager.
Enable secure and scalable communication between containers in ECS using Service Discovery.
Send transactional mail securely and at scale, directly from your AWS account—without the need for third-party services.
Get a notification in your Slack channel whenever something occurs in AWS.
Setting up an Identity Provider for AWS IAM to ensure secure authentication using GitLab as an example.