How To Send Transactional Emails Using Lambda and Amazon SES?
This blog post is about how to set up a full-stack serverless ReactJS application using AWS Amplify & AWS SES to send notification emails.
10 GitHub Security Best Practices
Being the largest source code host in the world, GitHub’s security can be complicated. In this blog post, we’re going to talk about 10 GitHub security best practices and why we should configure these.
What is Endpoint Security?
In this blog post, we’re going to talk about endpoints, and how to secure them.
The Complete Guide to Implement Social Login With AWS Amplify
Learn about how to set up a full-stack serverless ReactJS application using AWS Amplify with Google and Facebook Login functionality.
What is a Cyber Attack?
In this blog, we explain the most common types of cyber attacks, talk about the worst cyber attacks in history, and how to prevent cyber attacks.
How to Securely Share AWS S3 Files
In this blog post, we talk about a real-world use case for sharing AWS S3 files securely. We provide architecture and configurations for all steps that you need.
The Ultimate Guide for Cloud Migration
In this blog, we explain the benefits, challenges, and important steps of cloud migration. This blog can guide your migration to the cloud. Let's dive into it!
What is Red Teaming?
Red Teaming is a simulation of an actual attacker's activity that is based on the most up-to-date knowledge regarding risks that are relevant to a company.
Broken Access Control vs Broken Authentication
Authentication is the process of verifying the identity of a given user or client. Authorization (or access control) is the process of verifying an entity's identity.