Cloud security March 20, 2023 Bianca Gonzalez Secure cloud computing: What you need to know APT groups are behind recent ransomware campaigns. Learn five ways you can prevent your organization from becoming the next victim.
Cloud security February 20, 2023 Joe South Working across multiple cloud service providers: CSP security learning path Cloud, misconfiguration and learning to work across multiple cloud service providers as a cloud security engineer.
Cloud security February 9, 2023 Joe South Securing cloud-based applications training: What you need to know Learn about securing cloud-based applications no matter what cloud platforms you're using.
Cloud security May 24, 2022 Gilad Maayan Security risks of cloud migration An overview of cloud migration projects and the considerations for migrating applications to the cloud.
Cloud security May 3, 2022 Gilad Maayan DevSecOps in the Azure Cloud Explore how organizations operating in the Microsoft Azure cloud can use a vendor-prescribed architecture and dedicated security tools to adopt a DevSecOps process.
Cloud security January 26, 2022 Gilad Maayan Amazon Athena Security: 6 essential tips Learn about Amazon's popular cloud service, Amazon Athena, and how to improve visibility and control.
Cloud security August 24, 2021 Gilad Maayan Securing cloud endpoints: What you should know Let’s take a closer look at security challenges affecting endpoints in public and private clouds.
Cloud security March 24, 2021 Robert Johnson AWS security and compliance overview Amazon offers many solutions for ensuring your environment is secure and meets many industry standard compliance frameworks. By properly utilizing tools such...
Cloud security February 24, 2021 Mosimilolu Odusanya CloudGoat walkthrough series: IAM privilege escalation by attachment This is the fourth in the walkthrough series of the CloudGoat scenarios. CloudGoat is a “vulnerable by design” AWS deployment tool designed by Rhino Security...
Cloud security February 3, 2021 Mosimilolu Odusanya CloudGoat walkthrough series: EC2 server-side request forgery (SSRF) This is the fifth in the walkthrough series of the CloudGoat scenarios. CloudGoat is a “vulnerable by design” AWS deployment tool designed by Rhino Security...