Blog Post by ScaleSec
ScaleSec7 min read
Your Guide to Google Cloud Function Identities
Trying to scope your Google Cloud Functions effectively? Here’s what you should know ...
Start Reading
ScaleSec9 min read
Best Practices for AWS Serverless Endpoint Security
Learn about AWS endpoint security best practices for your serverless stack — from TLS/SSL ...
Start Reading
ScaleSec4 min read
Cloudknocking
Using Cloud Native Services to Obfuscate Command and Control.
Start Reading
ScaleSec6 min read
Security Best Practices for Amazon Elasticsearch - Part Two
Secure your Amazon Elasticsearch cluster using our recommended best practices. Read more ...
Start Reading
ScaleSec7 min read
Role Shopping: Embrace Your Tags
Role shopping and permissions creep undermines least privilege, here we discuss how to ...
Start Reading
ScaleSec9 min read
Security Best Practices for Amazon Elasticsearch - Part One
Secure your Amazon Elasticsearch cluster using our recommended best practices. Read more ...
Start Reading
ScaleSec3 min read
Rightsize Your IAM Policies
Quickly reduce your attack surface by securing your IAM policies.
Start Reading
ScaleSec8 min read
Getting Started with TDD in AWS
TDD can improve your security posture in AWS.
Start Reading
ScaleSec1 min read
ScaleSec announces: Modernizing Security, an AWS series
The Modernizing Security: AWS Series blog will focus on two objectives that add business ...
Start Reading
ScaleSec7 min read
Giving Thanks and Ringing in the New Year at ScaleSec
This year was a big one for ScaleSec, as we made strides in our competencies, cemented ...
Start Reading