Refactoring by Example for Security Engineers
Learn how to refactor a stand alone threat detection bash script to a container and ...
A Layperson's Guide to GCP Network Firewalling
GCP Network Firewall companion for cloud professionals interested in a well-rounded ...
Understanding AWS Service Control Policies
An introduction to AWS Service Control Policies, their application, and the simple, ...
Highlights from AWS re:Inforce 2022
Highlights from AWS security conference, 2022.
Exploit SSRF to gain AWS Credentials
Learn how Server Side Request Forgeries (SSRF) can abuse the default AWS instance ...
Identity Federation for GitHub Actions on AWS
Securing access to AWS resources for GitHub Actions workflows with OpenID Connect ...
Zero Trust in the Cloud
What is Zero Trust and how does it work in the Cloud?
Automating AWS IAM Remediation in Python
Tips and challenges of automating AWS IAM remediation in Python to help developers to ...
Google Cloud Security Summit 2022 Highlights
Summary of some notable sessions at the annual Google Cloud Security Summit 2022 ...
Implementing Secure Code in the Cloud
Learn how to implement security in the cloud at the application layer.