PinnedAndrew BloomaninOSINT TeamBuild Your Own Cyber Threat Intelligence System…at Home!Learn how to collect Threat Intelligence for freeAug 29Aug 29
PinnedAndrew BloomaninAWS TipStop using SSH in AWS! Here’s Why! A DevSecOps PerspectiveUsing Session Manager to provide secure EC2 access, whilst improving incident response capabilities with activity recording.Jul 2810Jul 2810
Andrew BloomaninAWS TipHashicorp Certified: Terraform Associate (003) —Study GuideWhy Terraform Skills are Important for Security Engineers16h ago16h ago
Andrew BloomaninITNEXTDeploy Elastic Search, Logstash & Kibana on Docker for receiving Syslog Events, in Minutes!Deploy your own logging platform to a home lab2d ago2d ago
Andrew BloomaninOSINT TeamYour Everyday Threat Intel: Build A Threat Hunting Platform at Home!Learn how to Collect Open Source Threat Intelligence3d ago3d ago
Andrew BloomaninAWS TipAWS Service Control Policies: Cloud Governance & Guardrails in ActionPolicy-as-Code for Governance & Compliance5d ago5d ago
Andrew BloomaninAWS TipAWS Network Security. Taking a Deep Dive into VPC Flow LogsHow to make the most of network logging in AWS.Aug 311Aug 311
Andrew BloomaninAWS Tip15 AWS IAM concepts you need to know!From the basics to the most advanced concepts.Aug 26Aug 26
Andrew BloomaninITNEXTChatGPT vs Snyk — Using DevSecOps to Secure AI Generated CodeWhy Generative AI still isn’t producing secure codeAug 21Aug 21
Andrew BloomanBest Practice Guidance for AWS Cloud AdoptionTips and Tricks for AWS MigrationsAug 18Aug 18