Blog SecurityKeep in touch
Secure your App Service with OAuth 2.0 and Terraform on Azure
Learn how to secure a web application running on Azure App Service with Google authentication based on OAuth 2.0 without effort thanks to Terraform.
How to secure multiple accounts with GCP's SCC?
Securing the Cloud Ecosystem with GCP's Security Command Center for Multi-Account Strategies
Discover Paralus, a controlled and audited access to Kubernetes
Paralus empowers companies by providing a centralized Kubernetes user authentication and authorization tool as well as audit logs.
Detecting and dealing with cleartext secrets in code
Learn how to clear your code base of hardcoded cleartext secrets and prevent new secrets from being added by mistake later on.
Deploy Falco with Falcosidekick on ECS
Secure your AWS ECS cluster with Falco. This article explains how to implement Falco with falcosidekick on your ECS cluster with EC2 launch type.
How to use honey tokens effectively to detect intrusion in AWS
Explore the effectiveness of Honey Tokens in AWS. Learn how to deploy and strategically position them to early detect potential attackers.
Easily plug any webapp to any IdP using oauth2-proxy
Learn how to implement an oauth2-proxy on your kubernetes cluster for secure and easy access to your apps with SSO.
AWS Application Load Balancer Authentication
Learn how to authenticate your users to your applications with an Application Load Balancer and AWS Cognito.
IAM Identity Center: why you should get rid of IAM Users
Do you use IAM users to manage the employees? Let’s see why it is a huge mistake and why you should replace it with AWS IAM Identity Center.