PinnedAndrew BloomanBuild Your Own Cyber Threat Intelligence System…at Home!Learn how to collect Threat Intelligence for freeAug 27Aug 27
PinnedAndrew BloomaninAWS TipStop using SSH in AWS! Here’s Why! A DevSecOps PerspectiveUsing Session Manager to provide secure EC2 access, whilst improving incident response capabilities with activity recording.Jul 288Jul 288
Andrew BloomanAvoid Unsuccessful AWS Cloud Adoption StrategiesIs there a secret to being successful?20h ago20h ago
Andrew BloomanBuild Your Own Cyber Threat Intel Feeds at Home! (MISP)Learn how to Collect Open Source Threat Intelligence4d ago14d ago1
Andrew BloomanHow to Block Ads and Unwanted Network Traffic Using Pi-HoleDNS ad blocking for the massesAug 12Aug 12
Andrew BloomanSecurity Engineering is Dead. It’s time to Adopt Platform SecurityRedefining roles in an ever changing security landscapeAug 111Aug 111
Andrew BloomanStop Server-side Request Forgery on AWS EC2 Instances (IMDS)Update to IMDSv2 to reduce the attack surface for your EC2 instancesAug 6Aug 6
Andrew Blooman10 Essential Tips to Become a Successful Platform Security EngineerGuidance for aspiring security engineersJul 31Jul 31
Andrew BloomanAdvanced AWS IAM Concepts. Permission BoundariesEmpower developers to build, within GuardrailsJul 23Jul 23
Andrew BloomanStop using AWS IAM Keys! Here’s how!How to improve your IAM posture without sacrificing productivity.Jul 181Jul 181