Read more articles by Jason Dyke
Blog Post by Jason Dyke
Jason Dyke9 min read
Access GCP from AWS using Workload Identity Federation
Workload Identity federation allows cloud users to access GCP resources from AWS without ...
Start Reading
Jason Dyke4 min read
Identify Unused Service Accounts in GCP
Easily find and identify unused service accounts across your entire GCP organization.
Start Reading
Jason Dyke7 min read
Inventory Your GCP API Keys
Inventory, analyze, and report on your GCP API keys in an automated fashion.
Start Reading
Jason Dyke9 min read
Automate Security on GCP with Event Threat Detection
Leverage GCP Cloud Functions and Event Threat Detection to automate your cloud security ...
Start Reading
Jason Dyke13 min read
Encryption in The Cloud Pt. 2
A multipart exploration into cloud encryption. Part 2: Encryption in Google Cloud Storage.
Start Reading
Jason Dyke8 min read
Our Favorite AWS re:Invent Security Announcements
In this blog you will find a brief rundown of our favorite security announcements from ...
Start Reading
Jason Dyke11 min read
How I Passed the CISSP
My personal experience with the CISSP by Jason Dyke.
Start Reading
Jason Dyke10 min read
Encryption in The Cloud Pt. 1
This is the first of a multipart dive into encryption in the public cloud. Part 1 will ...
Start Reading
Jason Dyke4 min read
Using Terraform to Secure Your AWS Organizations
Apply security guardrails and best practices on the organizational level using Service ...
Start Reading