12 Days of Cloud Security Christmas
ScaleSec celebrates the holiday season with 12 gifts users should avoid giving their ...
TDD in Your Infrastructure Pipeline
Using TDD can be an effective way to move fast and not break security.
Using WAF and CloudFront with Serverless Applications
The third installment of security best practices for serverless applications running on ...
Test Driven Development for Secure Infrastructure
Test Driven Development helps keep your infrastructure safe.
PassRole Control
How the iam:PassRole permission can be restricted and monitored in AWS.
Why Your YubiKey Won’t Work With AWS CLI (and the fix)
Set up a YubiKey as two-factor authentication in AWS that will work with the Console, ...
Data Loss Prevention on Google Cloud
How to use Cloud DLP to secure batch and streaming data.
Make Least Privilege Easier in AWS
Five approaches to making IAM Least Privilege easier within your AWS environments.
Shifting Application Security to the Left
Automate and simplify your application security process by shifting it to the left.
Threat Detection with AWS GuardDuty
This is a walkthrough of an AWS Security Workshop with scenarios covering threat ...