Total 26 Posts

Security

Elevate Your Security Game with Amazon Security Lake and Amazon Kendra

No matter how good your cybersecurity posture is, the human element has been and always will be the Achilles' heel. In today's fast-paced digital world, getting a leg up on cybersecurity entails meeting the users half way between policy and best practices.…

Read More


Nov 27, 2023 3 min read

Lucas Ward

AWS

Hardening Kubernetes and What That Entails With Entando

Web Application security is hard. Doing security right in Kubernetes is even more difficult. In order to cover everything listed in the Kubernetes Threat Matrix, you have to follow best practices across the board. Shift security left and use opinionated platforms like Entando.…

Read More


Dec 20, 2022 7 min read

Lucas Ward

Kubernetes

In Real Life - Amazon Web Services: Identity Access Management

A Quick Note about In Real Life Digital concepts can get confusing for a lot…

Read More


Dec 14, 2020 6 min read

Matt Reed

AWS

How to Connect an AWS API Gateway to a Private VPC Using an ALB

AWS and API Gateway The AWS ecosystem provides developers and system administrators with many tools…

Read More


Sep 28, 2020 9 min read

Juan Manuel Carnicero Vega

Cloud

Keycloak High Availability in Cloud environment (AWS) - PART 4/4

All the configuration presented in the previous parts [https://test-ippon.ghost.io/feedback-keycloak-high-availability-in-cloud-environment-aws-part-3-4/] have been…

Read More


Jul 29, 2020 9 min read

Sébastien Mazade

Feedback

Keycloak High Availability in Cloud environment (AWS) - PART 3/4

In previous part [https://test-ippon.ghost.io/feedback-keycloak-high-availability-in-cloud-environment-aws-part-2-4/] , we have explained our context and how…

Read More


Jul 08, 2020 9 min read

Sébastien Mazade

Feedback

Securing your APIs using Okta and a JHipster gateway

A step by step guide on setting up a JHipster application with Okta that provides first class support for system users.…

Read More


Jun 18, 2020 10 min read

Ben Scott

JHipster

Keycloak High Availability in Cloud environment (AWS) - PART 2/4

In the previous first part [https://test-ippon.ghost.io/feedback-keycloak-high-availability-in-cloud-environment-aws-part-1-4/] , we have described the main…

Read More


Jun 08, 2020 12 min read

Sébastien Mazade

Feedback

Keycloak High Availability in Cloud environment (AWS) - PART 1/4

For those who do not already know the Keycloak product, it is the main IAM…

Read More


May 20, 2020 9 min read

Sébastien Mazade

Feedback

AWS Cognito and JHipster for the LOVE of OAuth 2.0

OAuth 2.0 [https://oauth.net/2/] is a stateful security mechanism. OpenID Connect (OIDC)…

Read More


Feb 25, 2020 5 min read

Theo LEBRUN

JHipster

Integrating Civic into a Static Serverless Website (part 2 of 2)

This is the second part of this tutorial (first part here [https://test-ippon.ghost.io/…

Read More


Mar 28, 2019 11 min read

Tyler John Haden

AWS

Integrating Civic into a Static Serverless Website Part 1 of 2

This article describes an application that takes advantage of AWS serverless services to provide a…

Read More


Mar 25, 2019 10 min read

Tyler John Haden

AWS

Service Oriented Network Security - AWS Security Group Design

Amazon Web Services is capable of providing the infrastructure to run all of your applications…

Read More


Aug 23, 2016 9 min read

Josh Shipp

AWS

JHipster: Streamlining the Hackathon Experience

For most 24 hour Hackathons, the work starts a week or two prior to the…

Read More


Jan 13, 2016 3 min read

Ahmed MSOUBER

Angular

Security White Paper: OWASP - Building Secure Web Applications

Nowadays, software application security absolutely cannot be ignored and every IT professional must take this…

Read More


Jul 17, 2014 1 min read

Victoria De Belilovsky

OWASP