Blogs

Check out some of our insights and how to articles

Recent changes to AWS ACM

Did your SSL certificate issued through AWS Amazon Certificate Manager (ACM) recently stop working as expected? The time...

What to do if you lose your AWS EC2 Keys

Whilst many companies have moved onto containerised solutions, there are still a lot around relying on EC2. N.B. Keep...

What should be in your AWS Security Account? (Part 1)

Firstly, you should absolutely have a security account! This article will be a brief intro to Amazon GuardDuty. What is...

What should be in your AWS Security Account? (Part 2)

This article will be a brief intro to AWS Security Hub. What is it? AWS Security Hub is a comprehensive security service...

What AI services do AWS provide?

Firstly some clarity AI is what happens, LLM (large language model) is how. AI has rapidly become more prevalent over...

Managing Dockerised Lambdas within regulated environments.

In a world where vulnerabilities appear in the most unlikely places, such as the recent vulnerability within the xz...

Hosting AWS Cloudfront using Origin Access Identity (OAI) vs Origin Access Control (OAC)

Both Origin Access Identity (OAI) and Origin Access Control (OAC) are mechanisms to enhance the security of CloudFront...

AWS lambda Limits

Technologies mentioned include AWS Lambda, SST. Lambda limits can be found on the service quota page Soft Limits...