Common Cloud-Native Security Misconfigurations & Fixes

Credit to Author: Michael Langford| Date: Fri, 30 Sep 2022 00:00:00 +0000

Cloud configuration errors are a major concern for modern DevOps teams, introducing a new attack surface with numerous potential points of vulnerability. Read on to discover some of the most common errors and learn how to resolve them.

Read more

Simplify with Network Security as a Service (NSaaS)

Credit to Author: Duane Seon| Date: Fri, 23 Sep 2022 00:00:00 +0000

Learn more on how network security as a service (NSaaS) employs the latest technologies to counter unknown threats and detect abnormal behavior before it becomes a direct threat.

Read more

Unlocking Serverless with AWS Lambda and IAM

Credit to Author: Braden Collingwood| Date: Thu, 25 Aug 2022 00:00:00 +0000

Learn how Lambda and IAM unlock the power and versatility of the cloud by implementing a serverless User API that can be expanded on as you grow and explore the many services on AWS.

Read more

How to implement AWS Sustainability Pillar principles

Credit to Author: Joy Ngaruro| Date: Fri, 27 May 2022 00:00:00 +0000

Learn more about the AWS Well-Architected Framework Sustainability Pillar and how to securely and efficiently implement the six design principles to help you reduce your environmental impact while balancing agility and operational excellence.

Read more

Detect Azure AD Hybrid Cloud Vulnerabilities

Credit to Author: Jiri Sykora| Date: Thu, 19 May 2022 00:00:00 +0000

AADInternals is a PowerShell module widely used by administrators for administering Azure Active Directory (AD) and Microsoft 365 – learn how to protect against their common vulnerabilities.

Read more

Adding Guardrails To A Cloud Account After The Fact

Credit to Author: Melanie Tafelski| Date: Wed, 11 May 2022 00:00:00 +0000

This article outlines a priority checklist of which guardrails need to be applied to an existing cloud account. Answering questions like, can these guardrails be implemented without breaking anything? What level of testing is required?

Read more

Mitigate Top 5 Common Cybersecurity Vulnerabilities

Credit to Author: Melanie Tafelski| Date: Tue, 22 Mar 2022 00:00:00 +0000

Vulnerabilities in software and infrastructure are a fact of life for developers and SREs. But when you understand vulnerabilities, you can minimize their impact. Learn more about five common threats and how to mitigate them.

Read more