Custom JWT Generation for Cloud Solutions
What is JWT, JWT use cases, why do we need custom JWT? In this blog post we give you details about custom JWT generation for your AWS Cloud solution and different JWT attacking tools that could be useful for your pentest processes.
What is Cloud Security?
Cloud security focuses on protecting cloud-based data from cyber threats. Find information and example cases about cloud security.
AWS IAM for Red and Blue Teams
Learn how you can securely manage access to AWS services and resources. See AWS IAM from two perspectives = Red Team vs. Blue Team.
Hacking News for AWS S3
Explore some real data breaches and misconfiguration scenarios related to the AWS S3 service. Learn how to configure your AWS S3 buckets.
AWS SDK for Python Boto3 Cheat Sheet & Code Snippets
Learn about the most common functionalities of Boto3, AWS SDK(Software Development Kit) for Python. Benefit from the code snippets provided for easy use.
Multi-Tenant Architectures with AWS Cognito
Learn how to build multi-tenant applications usig AWS Cognito. Discover authentication and authorization mechanisms for multi-tenant architectures.
The Best User Management Service = AWS Cognito
Discover how to provide user management with AWS Cognito User Pool and access control to web and mobile app users in a quick and easy way.
How to Create Web Apps with AWS Serverless Microservice Patterns [Part 2]
Discover how to create a GraphQL API and use it in front-end React apps. Learn how to set up the dev environment, create DynamoDB, connect with GraphQL API, and connect front-end to API.
AWS Security Services Overview
Discover the broad range of services Amazon Web Services (AWS) offers its customers and learn how to keep your organization secure while using cloud computing.
Installation Guide for Qualys Sensor in AWS ECS Cluster
Use our installation guide to deploy Qualys Container Sensor in AWS ECS Cluster step by step.
5 Best Vulnerability Scanning Tools for Docker Images
Get to know about the best 5 docker vulnerability scanning tools. Start using them immediately by our installation and usage guides.
How to Secure Your Docker Containers = Tips and Challenges
Discover Docker technology, learn about Docker security best practices and Docker vulnerability scanning tools.
Ultimate Guide to Securely Deploy Django at Scale on AWS ECS [Part 3]
Learn how to securely deploy a dockerized Django application to AWS Elastic Container Service with Auto Scaling.
Ultimate Guide to Securely Deploy Django at Scale on AWS ECS [Part 2]
Ultimate Guide to Securely Deploy Django at Scale on AWS ECS [Part 1]
How to Create Web Apps with AWS Serverless Microservice Patterns [Part 1]
Secure AWS VPC Design and Configuration Guide
An AWS Virtual Private Cloud (VPC) is the keystone of AWS networking. VPC is an isolated virtual network that you define in your AWS infrastructure.
How to Enable Cross-Account Access to Your AWS Account
AWS IAM service is the central place to manage users, groups, roles and access policies. You can create and manage IAM users and grant permissions for those IAM users to access your resources.
We offer 360° Security protection for your business with our trusted experts in cybersecurity.
Purplebox, Inc. Atlanta, GA email@example.com