OWASP Top 10 Vulnerabilities

Over the last few years, more than 10,000 Open Web Application Security Project (OWASP) vulnerabilities have been reported into the Common Vulnerabilities and Exposures (CVE®) database each year. This is a list of common identifiers for publicly known cybersecurity...

Announcing New Training Plans

Drive your teams’ training with our new Training Plans Manage training across your teams — no matter the size or location — more easily with our new feature set. You know that being able to drive training in a large organization is always a challenge. Conflicting...

What is Cognito in AWS?

Web applications usually allow a valid username and password combination for successful sign in to the application. Modern authentication flows incorporate more approaches to ensure user authentication. When using AWS, this is no exception, thanks to the abilities and...