Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec Blog

Brandon Walker4 min read

Webinar Recap: How To Prevent Ransomware Attacks with ScaleSec and Spin.ai

Together, ScaleSec and Spin.AI can create a more secure and ransomeware protected ...
Start Reading
ScaleSec12 min read

Counting the Cost: The Urgency of Securing Your Business Against Ransomware

Explore ransomware threats in cloud computing & discover strategies to protect your ...
Start Reading
Dennis Chow12 min read

Red Team Payload with Go and GCP

Learn how to leverage GoLang and GCP Storage buckets as a Command and Control (C2) ...
Start Reading
Dennis Chow16 min read

Refactoring by Example for Security Engineers

Learn how to refactor a stand alone threat detection bash script to a container and ...
Start Reading
Dennis Chow7 min read

Exploit SSRF to gain AWS Credentials

Learn how Server Side Request Forgeries (SSRF) can abuse the default AWS instance ...
Start Reading
Aaron Wilson5 min read

How Do I Urgently Harden Cloud Services?

Actions teams can take today to protect against potential cyberattacks
Start Reading
Steven Adegbenle6 min read

Cloud-Native Ransomware Protection in GCP

GCP Cloud-Native way to fend off ransomware.
Start Reading
Allison DiPietro4 min read

Cybersecurity Executive Order: a tl;dr

What the White House’s Executive Order on Cybersecurity means for software companies, and ...
Start Reading
Eric Evans8 min read

Cloud-First API Security

APIs can be secured using AWS and GCP cloud native technologies and architectures.
Start Reading
Eric Evans11 min read

A Guide to Securing Google Kubernetes Engine

This guide helps you secure Google Kubernetes Engine (GKE).
Start Reading