
Deploying web applications with GitHub Actions
A guide on deploying your first (or second, or third or …) application from a code repository to a server via the awesome GitHub Actions workflow.
A guide on deploying your first (or second, or third or …) application from a code repository to a server via the awesome GitHub Actions workflow.
A guide on how to perform an EC2 Vulnerability Scan using Amazon Inspector with the console and the CLI.
A security audit allows you to collect information about a system which can then be analysed to identify if there are security weaknesses. This article describes how you can perform a security audit of your Mongo Cloud account.
CloudTrail is a service offered by AWS to monitor and record all actions taken within an AWS account. This article describes how you can get started with AWS CloudTrail to monitor for security sensitive APIs.
A step-by-step guide on how to identify Log4j vulnerabilities on Windows machines using log4jscanwin
Developers may sometimes, accidentally or due to the lack of security knowledge, store secrets, keys or passwords within code repositories. These may then get leaked over the Internet, resulting in attackers taking over accounts or accessing sensitive information. This article describes how you can scan your Github org repos for secrets.