
Reinforce the power of your AWS scanning with Trivy
LEVEL: BEGGINNER As we already know, AWS counts with a useful tool to scan our images for vulnerabilities when we push them to our...

How to secure your business? Is your data secure?
One of the main concerns of a company when deciding to move part or all of its computing and data management resources to a cloud...

CyberSecurity Month: Tips to avoid being phished
October is Cybersecurity Awareness Month. And just today, Twitch has been breached, badly. How does this relate to phishing, you wonder?...

Getting into your instances
Did you get excited about this article? Let’s have a look at how it is on a less theoretical level. Ok, so you have created an...

Advanced Direnv for Devops
Now you are using Direnv to manage your workspaces, but you stumble upon a difficulty, maybe motivated (like me) by Terraform workspaces....

Secure your access to GCloud cli with Service Accounts
Do you want a time-sensitive way to give access to a third party to your GCP account with a low administrative burden? Look no further!...

How to keep your AWS Keys Safe on your terminal
One of the causes of AWS Keys leaks is configuring your AWS CLI by using the command aws configure; This can lead you to store your...

Did you know there is a better way to connect to your AWS Linux Instances than SSH?
For years, you used SSH as the only way to access your ec2 instances, surely you've exposed port 22 to anywhere (0.0.0.0/0) making your...

What Constitutes a HIPAA Violation?
Before cloud services can be used by healthcare organizations for storing or processing protected health information (PHI) or for...

AWS Multi-account architecture
Have you ever heard the saying ‘never put all the eggs in one basket’? Even today, we stumble upon projects, even recent ones, which are...