How-To Guides


Verify IOCs & Improve Incident Response with VirusTotal
Learn how to use VirusTotal to verify Indicators of Compromise (IOCs) and enhance your incident response with automated workflows and threat intelligence.
Verify IOCs & Improve Incident Response with VirusTotal
Learn how to use VirusTotal to verify Indicators of Compromise (IOCs) and enhance your incident response with automated workflows and threat intelligence.


Granting GitHub Repo Access to Organization Secrets
Learn how to update GitHub secrets settings when adding a new repository. Follow this guide to ensure your new repo has the necessary access.
Granting GitHub Repo Access to Organization Secrets
Learn how to update GitHub secrets settings when adding a new repository. Follow this guide to ensure your new repo has the necessary access.


How to Remove Unused Security Groups in AWS
Learn how to identify and delete unused security groups in AWS. Follow our guide to keep your AWS environment clean and secure.
How to Remove Unused Security Groups in AWS
Learn how to identify and delete unused security groups in AWS. Follow our guide to keep your AWS environment clean and secure.


How to Find Unused AWS Network Access Control Lists (ACLs)
Reduce security risks by finding and deleting unused AWS Network ACLs. Learn how to locate them using AWS tools.
How to Find Unused AWS Network Access Control Lists (ACLs)
Reduce security risks by finding and deleting unused AWS Network ACLs. Learn how to locate them using AWS tools.


How to Disable Public Access on Your AWS EKS Cluster
Learn how to secure your AWS EKS cluster by disabling public access to the Kubernetes API server endpoint using AWS Console or CLI.
How to Disable Public Access on Your AWS EKS Cluster
Learn how to secure your AWS EKS cluster by disabling public access to the Kubernetes API server endpoint using AWS Console or CLI.


Launch Spot Instances with AWS EC2 Auto Scaling Group
Learn to configure AWS EC2 Auto Scaling groups with Spot Instances to lower costs and optimize your cloud infrastructure efficiently.
Launch Spot Instances with AWS EC2 Auto Scaling Group
Learn to configure AWS EC2 Auto Scaling groups with Spot Instances to lower costs and optimize your cloud infrastructure efficiently.


Launch Template vs Launch Configuration and How to Migrate
Learn about the difference between launch template vs launch configuration and find out how to migrate from configurations to templates with our guide.
Launch Template vs Launch Configuration and How to Migrate
Learn about the difference between launch template vs launch configuration and find out how to migrate from configurations to templates with our guide.


Create AWS EC2 Launch Templates Without Public IP Access
Learn how to create AWS EC2 launch templates and block public access by configuring your launch template settings.
Create AWS EC2 Launch Templates Without Public IP Access
Learn how to create AWS EC2 launch templates and block public access by configuring your launch template settings.


How to Find and Delete AWS CLI Secrets Immediately
Learn how to find and delete unused AWS CLI secrets to reduce costs and enhance security. Follow our step-by-step guide to optimize your AWS account.
How to Find and Delete AWS CLI Secrets Immediately
Learn how to find and delete unused AWS CLI secrets to reduce costs and enhance security. Follow our step-by-step guide to optimize your AWS account.


How to Add Collaborators to Your GitHub Repo Easily
Learn how to add collaborators to your GitHub repositories using both the GitHub UI and API. Follow our guide to manage external contributions.
How to Add Collaborators to Your GitHub Repo Easily
Learn how to add collaborators to your GitHub repositories using both the GitHub UI and API. Follow our guide to manage external contributions.
Control your cloud security everywhere.
Cloud native, Decentralized, and Secure.Start transforming your cloud and security operations with Blink.