PinnedAndrew BloomaninOSINT TeamBuild Your Own Cyber Threat Intelligence System…at Home!Learn how to collect Threat Intelligence for freeAug 211Aug 211
PinnedAndrew BloomaninAWS TipStop using SSH in AWS! Here’s Why! A DevSecOps PerspectiveUsing Session Manager to provide secure EC2 access, whilst improving incident response capabilities with activity recording.Jul 2810Jul 2810
Andrew BloomaninITNEXTWhat is Vulnerability Management?The Beginners Guide to understanding Vulnerabilities2d ago2d ago
Andrew BloomanTerraform Best Practices For AWSUsing Terraform the Right Way for the AWS Cloud3d ago3d ago
Andrew BloomaninAWS TipHashicorp Certified: Terraform Associate (003) —Study GuideWhy Terraform Skills are Important for Security EngineersSep 7Sep 7
Andrew BloomaninITNEXTDeploy Elastic Search, Logstash & Kibana on Docker for receiving Syslog Events, in Minutes!Deploy your own logging platform to a home labSep 6Sep 6
Andrew BloomaninOSINT TeamYour Everyday Threat Intel: Build A Threat Hunting Platform at Home!Learn how to Collect Open Source Threat IntelligenceSep 4Sep 4
Andrew BloomaninAWS TipAWS Service Control Policies: Cloud Governance & Guardrails in ActionPolicy-as-Code for Governance & ComplianceSep 2Sep 2
Andrew BloomaninAWS TipAWS Network Security. Taking a Deep Dive into VPC Flow LogsHow to make the most of network logging in AWS.Aug 311Aug 311
Andrew BloomaninAWS Tip15 AWS IAM concepts you need to know!From the basics to the most advanced concepts.Aug 26Aug 26