Pros and Cons of Using Amazon Cognito for User Authentication
Amazon Cognito is a great service for easy integration of user authentication. But it may or may not be the best solution for your project.
Threat Vectors and Software Security: Securing DevOps
A strong DevOps process is critical for overall security of your software. The right workflow prevents vulnerabilities right from the start.
How to Protect Your Application Against an AWS Outage
No infrastructure or platform is perfect. How well is your business and application protected against an AWS outage?
Threat Vectors and Software Security: Securing the Organization
Security of your software starts at the organizational level. Good training and process starts at the top and trickles down.