
Ran Isenberg
3 days ago7 min read
5 Serverless Architecture Patterns You Should Stop Using (And What to Do Instead)
Avoid common AWS Serverless architecture pitfalls! Learn 5 outdated patterns & the best practices to replace them for better services

Ran Isenberg
Jan 276 min read
How Social Engineering Phishing Works: My Real-Life Encounter
Fell for a phishing attack using social engineering? I did—almost. Here’s how it worked, the tech behind it, and tips to stay safe.


Yaron Ben Ezra
Jan 157 min read
Simplify Security, Governance, and WAF Management with AWS Firewall Manager
Learn how to simplify AWS security, manage WAF rules, and enforce policies across accounts with AWS Firewall Manager, with AWS CDK code


Ran Isenberg
Dec 31, 20246 min read
2024 Summary & Come Write with Me
Review the year 2024 from my personal perspective and how to become a guest writer on my website

Ran Isenberg
Dec 16, 20244 min read
Protect Your API Gateway with AWS WAF using CDK
learn about AWS Web Application Firewall (WAF) and use CDK code to protect an REST API served by an API Gateway and enable metrics and logs


Ran Isenberg
Dec 6, 202410 min read
AWS re:Invent 2024: My Serverless Takeaways
AWS re:Invent 2024 exciting new services and features launched from a Serverless developer perspective.


Ran Isenberg
Nov 18, 20249 min read
AWS AppSync Events - Serverless WebSockets Done Right or Just Different?
AWS AppSync Events lets you broadcast realtime data with Serverless WebSockets. Learn how it works, use cases and diff from API GW Websocket


Ran Isenberg
Nov 13, 20247 min read
AWS WAF Essentials: Securing Your SaaS Services Against Cyber Threats
Learn about the AWS Web Application Firewall (WAF), what it is for, tips, and insights for visibility, ownership, governance and more