Cloud security May 24, 2022 Gilad Maayan Security risks of cloud migration An overview of cloud migration projects and the considerations for migrating applications to the cloud.
Cloud security May 3, 2022 Gilad Maayan DevSecOps in the Azure Cloud Explore how organizations operating in the Microsoft Azure cloud can use a vendor-prescribed architecture and dedicated security tools to adopt a DevSecOps process.
Cloud security January 26, 2022 Gilad Maayan Amazon Athena Security: 6 essential tips Learn about Amazon's popular cloud service, Amazon Athena, and how to improve visibility and control.
Cloud security August 24, 2021 Gilad Maayan Securing cloud endpoints: What you should know Let’s take a closer look at security challenges affecting endpoints in public and private clouds.
Cloud security March 24, 2021 Robert Johnson AWS security and compliance overview Amazon offers many solutions for ensuring your environment is secure and meets many industry standard compliance frameworks. By properly utilizing tools such...
Cloud security February 24, 2021 Mosimilolu Odusanya CloudGoat walkthrough series: IAM privilege escalation by attachment This is the fourth in the walkthrough series of the CloudGoat scenarios. CloudGoat is a “vulnerable by design” AWS deployment tool designed by Rhino Security...
Cloud security February 3, 2021 Mosimilolu Odusanya CloudGoat walkthrough series: EC2 server-side request forgery (SSRF) This is the fifth in the walkthrough series of the CloudGoat scenarios. CloudGoat is a “vulnerable by design” AWS deployment tool designed by Rhino Security...
Cloud security January 28, 2021 Mosimilolu Odusanya CloudGoat walkthrough series: Remote code execution This is the sixth in our walkthrough series of CloudGoat scenarios. CloudGoat is a “vulnerable by design” AWS deployment tool designed by Rhino Security...
Cloud security December 16, 2020 Mosimilolu Odusanya CloudGoat walkthrough series: Lambda Privilege Escalation This is the third in our walkthrough series of CloudGoat scenarios. CloudGoat is a “vulnerable by design” AWS deployment tool designed by Rhino Security...
Cloud security December 14, 2020 Gilad Maayan Information security strategy for the hybrid and multi-cloud Cloud computing is omnipresent, and most organizations are opting for a model that combines several types of cloud infrastructure: private and public cloud...