Deep Dive on the Cybersecurity Executive Order
Themes, requirements, and implementation expectations driven by the Cybersecurity ...
Battle of Policy as Code Tools: OPA vs. Semgrep
Evaluating major Policy as Code tools for usability and performance.
The Missing Half - Network Security and Squid
Easy and low-cost URL filtering via Squid proxy.
Cybersecurity Executive Order: a tl;dr
What the White House’s Executive Order on Cybersecurity means for software companies, and ...
SecOps Automation
Automating Security Operations in AWS by improving CIS Benchmark Alerts with EventBridge
Cloud-First API Security
APIs can be secured using AWS and GCP cloud native technologies and architectures.
Practical Attribute-Based Access Control with AWS
An explanation of attribute-based access control (ABAC) and some practical examples of ...
Tips for a Successful Cloud Security Consulting Engagement
Lessons and heuristics from successful consulting engagements.
Creating A GitHub App to Validate IAM Policies
Continuous IAM Policy Feedback with GitHub Apps.
Engagement Guardrails
How to navigate around potential engagement speedbumps.