Amy Higgins
8 posts
HANDS ON GUIDE TO AWS ROLE AND PERMISSIONS (STS ASSUME ROLE)
DEMO GUIDE TO AWS ROLE: AWS SECURITY TOKEN SERVICE (STS) Assume Role. Reference by Joseph Ndambombi Honpah 7…
SSH LLM Honeypot caught a real threat actor
Introduction In this article, I’ll show you how an LLM honeypot can trick a threat actor. The threat…
French AI summit signals shift from cooperation to competition
The AI Action Summit in Paris last week brought together politicians, academics and industry experts to discuss how…
Week 12: Release 0.3 pull request 1
Introduction This week I got my first pull request for release 0.3 merged. For this pull request, I…
50 Marketing Buzzwords to Know and Some to Avoid
At the beginning of my marketing career, I was hit with a bunch of acronyms that sounded more…
How Clickbait Works: The Psychology Behind Clickbait
In this online era, it’s hard — if not impossible — to surf the web without coming across…
30 Hidden Messages In Logos of Notable Brands
You know those instantly recognizable logos like Nike’s swoosh? Even though we’ve all seen them hundreds of times,…
How To Turn ‘Meh’ Ideas Into Marvelous Content
Ever received a not-so-great content idea at your organization? Don’t despair. Follow this idea transformation framework to turn…