Cloud security December 14, 2020 Mosimilolu Odusanya CloudGoat walkthrough series: Cloud Breach S3 This is the second in the walkthrough series of the CloudGoat scenarios. CloudGoat is a “vulnerable by design” AWS deployment tool designed by Rhino Security...
Cloud security December 8, 2020 Mosimilolu Odusanya CloudGoat walkthrough series: IAM privilege escalation by rollback This is the first in the walkthrough series of the CloudGoat scenarios. CloudGoat is a “vulnerable by design” AWS deployment tool designed by Rhino Security...
Cloud security December 7, 2020 Mosimilolu Odusanya Working with CloudGoat: The “vulnerable by design” AWS environment Many organizations today are leveraging the cloud to transform their business. However, the adoption of cloud technology introduces associated risks, security...
Cloud security November 16, 2020 Mosimilolu Odusanya Malicious Amazon Machine Images (AMIs) As organizations move their infrastructure, data and workload to the cloud, it is important to ensure that the Amazon Machine Images (AMI) from the AWS Marketplace...
Cloud security November 5, 2020 Daniel Brecht Key findings from Ponemon’s State of Vulnerability Management in the Cloud and On-Premises report In early February, Tesla paid $10,000 for a vulnerability in Microsoft SQL Server Reporting Services (SSRS) that was identified in its systems by a German bug...
Cloud security September 16, 2020 Howard Poston Cloud Pentesting Certification Boot Camp: The ultimate guide The CCPT certification is offered by the Infosec Institute to validate an applicant’s skills in cloud hacking and penetration testing. The certification...
Cloud security August 23, 2019 Frank Siemons Cloud Based IDS and IPS Solutions [Updated 2019] Defense-In-Depth is a term used to describe the practice of creating a multi-layered defense system within a network. Each layer should be covered by one or...
Cloud security August 23, 2019 Security Ninja AWS Security Monitoring Checklist [Updated 2019] Since every organization is moving towards cloud, the roles and responsibilities of in-house security teams have increased a lot. Due to lack of complete ownership,...
Cloud security July 24, 2019 Nikhil Kumar Amazon Inspector: A cloud-based vulnerability assessment tool Over the last few years, we have seen a lot of high-profile data breaches in organizations that are using cloud-based infrastructure. A cloud-based service...
Cloud security May 29, 2019 Greg Belding System administrator vs. cloud administrator For many first entering the IT field, the whole endeavor may come off as overwhelming at first. There are many good directions you can take your career in,...