
Create, attach, and detach EBS volumes
This academy article provides hands-on guidance on how you can create, attach, and detach EBS volumes to your EC2 instances on AWS.
This academy article provides hands-on guidance on how you can create, attach, and detach EBS volumes to your EC2 instances on AWS.
A new vulnerability named CVE-2020-15257 has been discovered in the networking namespace. Our blog covers the details.
Blurring of traditional perimeters with the emergence of cloud has led to rise of new threats. This talk by Rod Soto takes us through some of the attack scenarios and how defenders can implement detection to address these new threats.
1Password is a SaaS that is used to securely store and share credentials across team members. This article shows how you can perform a user audit and identify access or rogue users within your organisation.
Elastic Load Balancing (ELB) automatically distributes incoming application traffic across multiple targets and virtual appliances in one or more Availability Zones (AZs). In this article we will take a look at how to create an Application Load Balancer on AWS.
Creating Virtual Machines on cloud platforms is one of the most common activities. This article is a quick guide for creating a Virtual Machine on Google Cloud.