Cybersecurity Executive Order: a tl;dr
What the White House’s Executive Order on Cybersecurity means for software companies, and ...
SecOps Automation
Automating Security Operations in AWS by improving CIS Benchmark Alerts with EventBridge
Cloud-First API Security
APIs can be secured using AWS and GCP cloud native technologies and architectures.
Practical Attribute-Based Access Control with AWS
An explanation of attribute-based access control (ABAC) and some practical examples of ...
Tips for a Successful Cloud Security Consulting Engagement
Lessons and heuristics from successful consulting engagements.
Creating A GitHub App to Validate IAM Policies
Continuous IAM Policy Feedback with GitHub Apps.
Engagement Guardrails
How to navigate around potential engagement speedbumps.
Access GCP from AWS using Workload Identity Federation
Workload Identity federation allows cloud users to access GCP resources from AWS without ...
Identify Unused Service Accounts in GCP
Easily find and identify unused service accounts across your entire GCP organization.
Staying on the Cutting Edge of Cloud
A main ingredient to ScaleSec’s Cloud Security expertise is its investment in continued ...