Skip to content
Demystifying Policy as Code Non Technical Guide Effective Governance

ScaleSec Blog

Zach Beeler5 min read

AWS CDK: A Powerful and Secure IAC Tool for Your Organization

IaC has exploded in popularity in recent years because reusable infrastructure that can ...
Start Reading
ScaleSec3 min read

AWS re:Invent Day 4: myApplications launch and Inspector, Route 53 love

AWS re:Invent announcements for myApplications, Amazon Inspector, and Amazon Route 53 ...
Start Reading
ScaleSec3 min read

AWS re:Invent Day 3: New Clean Rooms and OpenSearch Features

AWS releases AWS Clean Rooms Differential Privacy, AWS CleanRooms ML, and Amazon ...
Start Reading
ScaleSec2 min read

AWS re:Invent Day 2: New AI Services!

Recap of AWS re:Invent 2023 Tuesday November 28, 2023
Start Reading
Cameron McCloud11 min read

Using AWS Config and Systems Manager for File Integrity Monitoring

Part 1 of planned two part article exploring whether AWS Config and Systems Manager can ...
Start Reading
Greg Peterson7 min read

Learning in the Cloud

Whether you're new to the industry or a seasoned Infrastructure Technology professional, ...
Start Reading
Anthony DiMarco7 min read

GitHub Actions on AWS: How to Implement Identity Federation

Using GitHub Actions to manage resources in AWS? Good news: With OIDC, you can configure ...
Start Reading
ScaleSec9 min read

How to Build an Effective & Safe Cloud Migration Strategy

Cloud migration can be a transformative move for your business — but only if you approach ...
Start Reading
Zach Beeler5 min read

Unlocking the Benefits of a Data Perimeter in AWS

Organizations can unlock cloud security benefits by establishing an AWS data perimeter.
Start Reading
Aaron Rea6 min read

AWS re:Invent 2022 Security Recap

A recap of security related announcements at re:Invent 2022.
Start Reading