Let's Unveil the Secrets: Your Ultimate Destination for Cutting-Edge IT Security Insights

See what we’ve
written lately
Alexander Hose
Meet our author Meet our authors Meet our top authors

How to Hack a Database in Under Five Minutes and How to Secure it

Initially, I intended to write an article about the new RDS brute force protection. And researching the two new RDS GuardDuty findings CredentialAccess:RDS/  AnomalousBehavior.SuccessfulLogin and CredentialAccess:RDS/ AnomalousBehavior.FailedLogin. But even after hours of trial and error, I could not trigger the GuardDuty finding. This article is for...

How to automatically identify sensitive data with AWS Macie

What happens when an organization collects user data from multiple sources, such as email addresses, phone numbers, device information, location, etc.? How do they ensure that their customer data remains secure even though they store it in various places across their enterprise? AWS developed the Amazon Macie service to address...

You’ve successfully subscribed to Alexander Hose
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.