Coder · Solutions Architect · Developer Advocate at AWS · Helping you learn how to build on AWS
Recent Posts
Social Engineering: What if the user opens backdoors to strangers?
Another great session at this weeks German OWASP Day was the closing keynote by Christina Lekati with the title "Social Engineering: What if the user opens backdoors to strangers". As a...
I just got back home from the German #OWASP Day, and one of the great presentations was Björn Kimminich's session where he demonstrated some interesting new features of the OWASP Juice Shop,...
Preventing SQL Injection Attacks: Best Practices for Developers
SQL injection attacks are one of the most common and dangerous types of attacks on websites and apps. They occur when malicious users inject SQL code into a database query in order to access, modify...
No matter if you build your workloads in the cloud or on-premises, there are a number of principles that can help you strengthen your workload security. Lets check them out: Implement a strong...
Zero Trust is a security model and set of mechanisms that emphasizes identity verification, least privilege access, continuous monitoring, and segmentation to provide security controls for digital...
Amazon S3 is often used for critical data such as backups and business-critical files. Protecting these files from accidental or malicious overwriting or deletion is crucial to avoid data loss and...