How to Build an Effective & Safe Cloud Migration Strategy
Cloud migration can be a transformative move for your business — but only if you approach ...
Unlocking the Benefits of a Data Perimeter in AWS
Organizations can unlock cloud security benefits by establishing an AWS data perimeter.
AWS re:Invent 2022 Security Recap
A recap of security related announcements at re:Invent 2022.
6 Keys to Securing User Uploads to Amazon S3
Architecting AWS applications to securely enable user uploaded content, using pre-signed ...
Understanding AWS Service Control Policies
An introduction to AWS Service Control Policies, their application, and the simple, ...
Highlights from AWS re:Inforce 2022
Highlights from AWS security conference, 2022.
Exploit SSRF to gain AWS Credentials
Learn how Server Side Request Forgeries (SSRF) can abuse the default AWS instance ...
Identity Federation for GitHub Actions on AWS
Securing access to AWS resources for GitHub Actions workflows with OpenID Connect ...
Zero Trust in the Cloud
What is Zero Trust and how does it work in the Cloud?
Implementing Secure Code in the Cloud
Learn how to implement security in the cloud at the application layer.