• Links
  • Lists
  • Tags
  • Login

Links

Add
Oldest Newest URL A-Z URL Z-A Title A-Z Title Z-A Random
https://t.co/DS1hmO5kvi?amp=1
https://t.co/DS1hmO5kvi?amp=1
 
malware security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Spoofing Cell Networks with a USB to VGA Adapter | Hackaday
https://hackaday.com/2018/04/23/spoofing-cell-networks-with-a-usb-to-vga-adapter/

RTL-SDR brought cheap and ubiquitous Software Defined Radio (SDR) to the masses, opening up whole swaths of the RF spectrum which were simply unavailable to the average hacker previously. Because t…

 
hacking security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Watch "Serverless Bytes | Workshop on Building a Serverless App" on YouTube
https://youtu.be/Hv3YrP8G4ag

AWS serverless experts Chris Munns & Ronald Widha walk you through developing a simple serverless application. You will learn how to use AWS Lambda, Amazon...

 
aws serverless training
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Wonk post: chosen ciphertext security in public-key encryption (Part 1) – A
https://blog.cryptographyengineering.com/2018/04/21/wonk-post-chosen-ciphertext-security-in-public-key-encryption-part-1/

In general I try to limit this blog to posts that focus on generally-applicable techniques in cryptography. That is, I don't focus on the deeply wonky. But this post is going to be an exception. Today, I'm going to talk about a topic that most "typical" implementers don't -- and shouldn't -- think about. Specifically:…

 
encryption
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://aws.amazon.com/blogs/aws/aws-config-update-aggregate-compliance-data-across-accounts-regions/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_aws_config&linkId=50736326
https://aws.amazon.com/blogs/aws/aws-config-update-aggregate-compliance-data-across-accounts-regions/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_aws_config&linkId=50736326

As I have discussed in the past, sophisticated AWS customers invariably control multiple AWS accounts. Some of these are the results of acquisitions or a holdover from bottom-up, departmental adoption of cloud computing. Others create multiple accounts in order to isolate developers, projects, or departments from each other. We strongly endorse this as a best […]

 
amazon aws compliance monitoring security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://aws.amazon.com/blogs/security/aws-single-sign-on-now-enables-command-line-interface-access-for-aws-accounts-using-corporate-credentials/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_sso&linkId=50708343
https://aws.amazon.com/blogs/security/aws-single-sign-on-now-enables-command-line-interface-access-for-aws-accounts-using-corporate-credentials/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_sso&linkId=50708343

May 23, 2022: This blog post is out of date. Please refer here for current info: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html September 12, 2022: This blog post has been updated to reflect the new name of AWS Single Sign-On (SSO) – AWS IAM Identity Center. Read more about the name change here. Today, AWS made it easier to use […]

 
amazon authentication aws cli sso
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://aws.amazon.com/blogs/aws/new-registry-of-open-data-on-aws-roda/
https://aws.amazon.com/blogs/aws/new-registry-of-open-data-on-aws-roda/

Almost a decade ago, my colleague Deepak Singh introduced the AWS Public Datasets in his post Paging Researchers, Analysts, and Developers. I’m happy to report that Deepak is still an important part of the AWS team and that the Public Datasets program is still going strong! Today we are announcing a new take on open […]

 
amazon aws data open data
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://aws.amazon.com/blogs/security/understanding-aws-cloudhsm-cluster-synchronization/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_cloudhsm&linkId=50579720
https://aws.amazon.com/blogs/security/understanding-aws-cloudhsm-cluster-synchronization/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_cloudhsm&linkId=50579720

Feb 17, 2025: This blog post references AWS CloudHSM Client SDK 3, which is no longer the recommended version. AWS recommends that you use the latest version, AWS CloudHSM Client SDK 5, which provides updated functionality and commands. We are currently working on an updated blog post for CloudHSM Client SDK 5. See the AWS […]

 
amazon aws encryption hardware security modules security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://aws.amazon.com/blogs/security/how-to-manage-amazon-guardduty-security-findings-across-multiple-accounts/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_guard_duty_multiple_accounts&linkId=50540054
https://aws.amazon.com/blogs/security/how-to-manage-amazon-guardduty-security-findings-across-multiple-accounts/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_guard_duty_multiple_accounts&linkId=50540054

September 9, 2021: Amazon Elasticsearch Service has been renamed to Amazon OpenSearch Service. See details. Introduced at AWS re:Invent 2017, Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads. In an AWS Blog post, Jeff Barr shows you how to […]

 
amazon aws security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://www.aws.training/?sc_channel=sm&sc_campaign=AWS_Training&sc_publisher=TWITTER&sc_country=Global&sc_geo=APAC&sc_outcome=awareness&trk=_TWITTER&sc_content=DLP&linkId=50495410
https://www.aws.training/?sc_channel=sm&sc_campaign=AWS_Training&sc_publisher=TWITTER&sc_country=Global&sc_geo=APAC&sc_outcome=awareness&trk=_TWITTER&sc_content=DLP&linkId=50495410
 
amazon aws training
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://isc.sans.edu/diary/23553
https://isc.sans.edu/diary/23553
 
incident management security writing
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://aws.amazon.com/compliance/gdpr-center/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_gdpr_center&linkId=50238985
https://aws.amazon.com/compliance/gdpr-center/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_gdpr_center&linkId=50238985
 
amazon aws regulations security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://aws.amazon.com/blogs/security/how-to-use-service-control-policies-in-aws-organizations/
https://aws.amazon.com/blogs/security/how-to-use-service-control-policies-in-aws-organizations/

January 20, 2020: Based on customer feedback, we rephrased the fourth goal in the “An example structure with nested OUs and SCPs” section to try to improve clarity. With AWS Organizations, you can centrally manage policies across multiple AWS accounts without having to use custom scripts and manual processes. For example, you can apply service […]

 
amazon authentication aws security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://isc.sans.edu/diary/23477
https://isc.sans.edu/diary/23477
 
detection malware security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://isc.sans.edu/diary/23473
https://isc.sans.edu/diary/23473
 
detection malware security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
For Everyone - PagerDuty Security Training
https://sudo.pagerduty.com/for_everyone/

This is an open-source version of 'Security Training for Everyone', PagerDuty's internal employee security training, given to all PagerDuty employees as part of our annual security training program.

 
security training
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://www.sqreen.io/checklists/saas-cto-security-checklist
https://www.sqreen.io/checklists/saas-cto-security-checklist

Production visibility and security for your web applications and APIs

 
security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://kkc.github.io/2018/03/14/AWS-VPN-with-RouterBoard/
https://kkc.github.io/2018/03/14/AWS-VPN-with-RouterBoard/

Notes about technology, DevOps, programming, and database

 
aws mikrotik networking routing vpn
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Sorting JSON by Value with JQ (Command Line JSON Processor) - Big Datums
http://bigdatums.net/2016/11/29/sorting-json-by-value-with-jq/

jq is a lightweight command line JSON processor that is very easy to use. Sometimes it is helpful to see your data sorted by a particular field value. Luckily jq makes this easy to do. Here are some sample JSON records we will be working with in this post: Sorting JSON by value with jq […]

 
jq json
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://aws.amazon.com/blogs/security/how-to-delegate-administration-of-your-aws-managed-microsoft-ad-directory-to-your-on-premises-active-directory-users/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_delegate_admin_msft_ad_on_prem&linkId=48982350
https://aws.amazon.com/blogs/security/how-to-delegate-administration-of-your-aws-managed-microsoft-ad-directory-to-your-on-premises-active-directory-users/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_delegate_admin_msft_ad_on_prem&linkId=48982350

You can now enable your on-premises users administer your AWS Directory Service for Microsoft Active Directory, also known as AWS Managed Microsoft AD. Using an Active Directory (AD) trust and the new AWS delegated AD security groups, you can grant administrative permissions to your on-premises users by managing group membership in your on-premises AD directory. […]

 
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
AWS Federated Authentication with Active Directory Federation Services (AD
https://aws.amazon.com/blogs/security/aws-federated-authentication-with-active-directory-federation-services-ad-fs/

Today we’d like to walk you through AWS Identity and Access Management (IAM), federated sign-in through Active Directory (AD) and Active Directory Federation Services (ADFS). With IAM, you can centrally manage users, security credentials such as access keys, and permissions that control which resources users can access. Customers have the option of creating users and […]

 
authentication aws federation security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://isc.sans.edu/diary/23383
https://isc.sans.edu/diary/23383
 
ad pentest security windows
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
Data Driven Decisions - Amazon Web Services (AWS)
https://aws.amazon.com/campaigns/data-driven-decisions/

Make more informed decisions, improve operations, and differentiate with generative AI

 
aws data
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
https://www.auscert.org.au/blog/2018-02-22-mandatory-data-breach-notification
https://www.auscert.org.au/blog/2018-02-22-mandatory-data-breach-notification
 
data breach mdbn security
Added 3 months ago
Share link via Email Share link via Facebook Share link via Twitter Share link via Reddit Share link via Whatsapp Share link via Telegram Share link via SMS Share link via sharing.service.bluesky Share link via Mastodon Share link via LinkedIn
  • ‹
  • 1
  • 2
  • ...
  • 37
  • 38
  • 39
  • ...
  • 44
  • 45
  • ›
Linkace is a project by Woblick.dev | PGMac . Net . AU | PGLinks