fbpx

Many of our customers use Amazon Cognito user pools to add authentication, authorization, and user management capabilities to their web and mobile applications. You can enable the built-in advanced security in Amazon Cognito to detect and block the use of credentials that have been compromised elsewhere, and to detect unusual sign-in activity and then prompt users for […]

Read more

As your organization looks to improve your security practices and posture, early detection and prevention of unauthorized activity becomes one of your main priorities quickly. The behaviors associated with unauthorized activity commonly follow patterns that you can analyze in order to create specific mitigations or feed data into your security monitoring systems. <p>You are showed […]

Read more

In this website post, we shall walk you through the EC2 forensic module factory solution to deploy automation to create forensic kernel modules which are necessary for Amazon Elastic Compute Cloud (Amazon EC2) incident response automation. <pre> <code> &lt;p&gt;When an EC2 instance is suspected to possess been compromised, it’s highly recommended to research what occurred […]

Read more

In this website post, you’ll learn to protect privileged company transactions that are uncovered as APIs through the use of multi-factor authentication (MFA) or protection challenges. These challenges possess two parts: everything you understand (such as for example passwords), and everything you possess (like a one-period password token). Through the use of these multi-factor security […]

Read more

Securing software-as-a-service (SaaS) applications is a top priority for all application architects and developers. Doing so in an environment shared by multiple tenants can be even more challenging. Identity concepts and frameworks can take time to understand, and forming tenant isolation in these environments requires deep understanding of different services and tools. While security is […]

Read more