Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec Blog

Steven Adegbenle4 min read

12 Days of Cloud Security Christmas

ScaleSec celebrates the holiday season with 12 gifts users should avoid giving their ...
Start Reading
Ilan Ponimansky6 min read

The Pillars of Secure Containers

Best practices for running containers in the cloud.
Start Reading
John Porter5 min read

End Security Debt with AWS Security Hub

Pay down security debt by configuring, controlling, and monitoring your AWS accounts with ...
Start Reading
Eric Evans3 min read

HashiConf Digital 2020 Recap and Announcements

HashiConf ‘20 has had many notable announcements around the HashiCorp Cloud Platform, ...
Start Reading
Steven Adegbenle4 min read

Multi-Cloud Security Reality Check

3 Things Everyone Keeps Telling You About Multi-Cloud Security.
Start Reading
Anthony DiMarco5 min read

Using WAF and CloudFront with Serverless Applications

The third installment of security best practices for serverless applications running on ...
Start Reading
Dustin Whited4 min read

PassRole Control

How the iam:PassRole permission can be restricted and monitored in AWS.
Start Reading
John Porter7 min read

Why Your YubiKey Won’t Work With AWS CLI (and the fix)

Set up a YubiKey as two-factor authentication in AWS that will work with the Console, ...
Start Reading
Dustin Whited7 min read

AWS Log Blog

Knowing the various AWS log types and the information they provide is the first step to ...
Start Reading
ScaleSec9 min read

Best Practices for AWS Serverless Endpoint Security

Learn about AWS endpoint security best practices for your serverless stack — from TLS/SSL ...
Start Reading