Close
Cloud Services
Cloud Consulting
Cloud Security and Compliance
Cloud Adoption and Modernization
Cloud Development and Engineering
Accelerators
Cloud Ransomware
AI Adoption
PCI Compliance
Adopting the Cloud
FedRAMP Solutions
Client Stories
Partners
All Partners
AWS
Google
Azure
Resources
Blog
Video Library
Downloads Library
News & Events
About
About Us
Working With Us
Search
Talk with Us
Talk with Us
ScaleSec Blog
Show all
2020 Review
ABAC
Access Control
Access Management
Acquisition
Actions
Analytics
Application Security
Appsec
Assessment
Audit Logs
Audit Manager
Authentication
Automation
AWS
AWS Budget Management
AWS Cost Optimization
AWS Firewall Manager
AWS GuardDuty
AWS IAM
AWS Lambda
AWS logs
AWS Security
AWS Security Hub
AWS Series
AWS WAF
Azure
Backup
Be Present
Best Practices
Books
Business
C2
CCPA
Certification
CIS
CISO
Cissp
CLI
Cloud
Cloud Adoption
Cloud Adoption Model
Cloud Computing
Cloud Cost Governance
Cloud Cost Savings
Cloud financial management
Cloud Fluency
Cloud Gaming
Cloud IAM
Cloud Migration
Cloud Native
Cloud Operating Model
Cloud Platform Engineering
Cloud Readiness
Cloud Readiness Assessment
Cloud security
Cloud SSL
Cloud Terminology
Cloud Terms
Cloud Transformation
Cloudtrail
Cloudwatch
Collaboration
Command&Control
Company Culture
compliance
Conference
Consulting
Consumer Privacy
Containers
Continued Education
Continuous Monitoring
Control Tower
Covid-19
Cryptography
Customer Success
Cyber Defense
Cybersecurity
DAST
Data
Data Breach
Data Exfiltration
Data Loss Prevention
Data Modeling
Data Perimeter
Data Privacy
Data Security
Data Sovereignty
Defense-in-depth
DevOps
DevSecOps
Digital
Digital Transformation
Docke
Docker
Documentation
EC2
Elasticsearch
Encryption
Engagements
Etd
EventBridge
EventBus
Events
Executive order
Executive order | ScaleSec
Exploit credential
Exploitation
Federation
FedRAMP
File Integrity Monitoring
FIM
Firewall
Firewall Policies
Firewalls,
Forensics
Game Server
GCE
GCP,
GDPR
GitHub
GKE
Golang
Google
Google Cloud
Google Cloud Functions
Google Cloud Platform
Google Cloud Security Summit
Google Compute Engine
Governance
GPG
Growth
Guardrails
Hashicorp
HashiCorp Vault
HIPAA
HITRUST
IaaS
IAM
IAM Policies
IAM Remediation
IAP
Identity
Identity Aware Proxy
IMDS
Incident Response
Infosec
Infrastructure
Isc2
JavaScript
KMS
Kubernetes
Lambda
least privilege
Malware
Management
MFA
Modernizing Security
Multi-Cloud
Network Security
Next
Next19
NIST
OIDC
OPA
Opensource
OpenVPN
OSCAL
Outcome
PaaS
Password management
PCI
PCI-DSS
Penetration testing
Pentesting
People First Approach
Permissions
PII
Platform Engineering
Playbook
Policy
Policy as Code
Privacy
Process Management
Programming
Project Management
Protection
Python
Ransomware
RASP
RBAC
re:Invent
Reading list
Recovery
Refactor
RESTful
Risk
Risk Mitigation
Roadblocks
Route53
S3
SaaS
Sales
SAML
SAST
SecOps
Secrets
Secrets Management
Secure Coding
security
Security Automation
Security Groups
Self Care
Serverless
Service Perimeters
Shared Responsibility
Shared Responsibility Model
SIEM
SOC 2
Software Development
Software Development Lifecycle
Software Engineering
Squid
SSH
SSRF
Stackdriver Monitoring
Startup
Static Analysis
Success
Supply Chain Security
TDD
Team Collaboration
Tech Jobs
Technology
Terraform
Threat Detection
Tips
Training
Travel
Tutorial
Twenty Percent Time
Unlock
Valheim
VPC Service Controls
VPN
Vulnerability
WAF
WFH
Yubikey
Zero Trust
Eric Evans
5
min read
Data Loss Prevention on Google Cloud
How to use Cloud DLP to secure batch and streaming data.
Start Reading
Steven Adegbenle
5
min read
Make Least Privilege Easier in AWS
Five approaches to making IAM Least Privilege easier within your AWS environments.
Start Reading
Jeanier Anderson
4
min read
Threat Detection with AWS GuardDuty
This is a walkthrough of an AWS Security Workshop with scenarios covering threat ...
Start Reading
Eric Evans
11
min read
GCP Secret Manager - First Look
With so many options to manage your secrets in the cloud, the decision on how to handle ...
Start Reading
Scott McDonald
7
min read
Hacking AWS with Pacu
There are a lot of lessons to be learned from the Capital One incident that was disclosed ...
Start Reading
Ron Sivonda
3
min read
Why a compliance strategy should be important to executives
Why is having a cohesive compliance strategy as a business or product executive ...
Start Reading
Chris Leibl
4
min read
GCP Shielded VM — Integrity Monitoring
Google Cloud announced Shielded VM all the way back at NEXT ’18 and it went GA at NEXT ...
Start Reading
Aaron Wilson
1
min read
Exporting Stackdriver Logs to Elastic Cloud
ScaleSec contributed a tutorial to the Google Cloud Community titled “Exporting ...
Start Reading