security
Follow these best practices for using AWS Identity and Access Management (IAM) to help secure your AWS account and resources.
In this post, we'll demonstrate querying the Amazon Redshift audit data logged in S3 to provide answers to common use cases described preceding.
The following 20 pages were the most viewed AWS Identity and Access Management (IAM) documentation pages in 2017. I have included a brief description with each link to explain what each page covers. Use this list to see what other AWS customers have been viewing and perhaps to pique your own interest in a topic you’ve […]
July 24, 2020: The number 9 item in this list, the Auditing Security Checklist, has been replaced by a Cloud Audit Academy course. The following list includes the ten most downloaded AWS security and compliance documents in 2017. Using this list, you can learn about what other AWS customers found most interesting about security and […]
Ransomware is one of the biggest scourges we face as Internet citizens today. What happens when you have been struck by it? The most obvious option would be to pay the ransom. You would not be alone if you did – even lar…
A proposed standard that allows websites to define security policies.
Meet your favorite 2FA app. We are an open-source, community-driven, private and simple solution for Internet's biggest threat - security breaches.
Because the Active Directory security lies in the process and not in expensive tools, our solution is simple: download PingCastle and apply its methodology.
Jigsaw is an interdisciplinary unit within Google that builds technology that inspires scalable solutions.
A black hole for Internet advertisements. Contribute to pi-hole/pi-hole development by creating an account on GitHub.
Wazuh is a free and open source security platform that unifies XDR and SIEM protection for endpoints and cloud workloads.
Canarytokens is a free tool that helps you discover you’ve been breached by having attackers announce themselves. The tokens allow you to implant traps around your network and notifies you as soon as they are triggered.
Free open source enterprise distributed VPN server. Virtualize your private networks across datacenters and provide simple remote access in minutes.