Elevate Your Security Game with Amazon Security Lake and Amazon Kendra
No matter how good your cybersecurity posture is, the human element has been and always will be the Achilles' heel. In today's fast-paced digital world, getting a leg up on cybersecurity entails meeting the users half way between policy and best practices.…
Hardening Kubernetes and What That Entails With Entando
Web Application security is hard. Doing security right in Kubernetes is even more difficult. In order to cover everything listed in the Kubernetes Threat Matrix, you have to follow best practices across the board. Shift security left and use opinionated platforms like Entando.…
In Real Life - Amazon Web Services: Identity Access Management
A Quick Note about In Real Life Digital concepts can get confusing for a lot…
How to Connect an AWS API Gateway to a Private VPC Using an ALB
AWS and API Gateway The AWS ecosystem provides developers and system administrators with many tools…
Keycloak High Availability in Cloud environment (AWS) - PART 4/4
All the configuration presented in the previous parts [https://test-ippon.ghost.io/feedback-keycloak-high-availability-in-cloud-environment-aws-part-3-4/] have been…
Keycloak High Availability in Cloud environment (AWS) - PART 3/4
In previous part [https://test-ippon.ghost.io/feedback-keycloak-high-availability-in-cloud-environment-aws-part-2-4/] , we have explained our context and how…
Securing your APIs using Okta and a JHipster gateway
A step by step guide on setting up a JHipster application with Okta that provides first class support for system users.…
Keycloak High Availability in Cloud environment (AWS) - PART 2/4
In the previous first part [https://test-ippon.ghost.io/feedback-keycloak-high-availability-in-cloud-environment-aws-part-1-4/] , we have described the main…
Keycloak High Availability in Cloud environment (AWS) - PART 1/4
For those who do not already know the Keycloak product, it is the main IAM…
AWS Cognito and JHipster for the LOVE of OAuth 2.0
OAuth 2.0 [https://oauth.net/2/] is a stateful security mechanism. OpenID Connect (OIDC)…
Integrating Civic into a Static Serverless Website (part 2 of 2)
This is the second part of this tutorial (first part here [https://test-ippon.ghost.io/…
Integrating Civic into a Static Serverless Website Part 1 of 2
This article describes an application that takes advantage of AWS serverless services to provide a…
Service Oriented Network Security - AWS Security Group Design
Amazon Web Services is capable of providing the infrastructure to run all of your applications…
JHipster: Streamlining the Hackathon Experience
For most 24 hour Hackathons, the work starts a week or two prior to the…
Security White Paper: OWASP - Building Secure Web Applications
Nowadays, software application security absolutely cannot be ignored and every IT professional must take this…