Andrew BloomanStop Hackers from Exploiting EC2 Instances — Here's How!Update to IMDSv2 to reduce the attack surface for your EC2 instances1d ago1d ago
Andrew BloomanBuild Your Own Cyber Threat Intelligence System…at Home!Learn how to collect Threat Intelligence for free5d ago5d ago
Andrew Blooman10 Essential Tips to Become a Successful Cloud Security EngineerGuidance for aspiring security engineersJul 31Jul 31
Andrew BloomanStop using SSH in AWS! Here’s Why! A DevSecOps PerspectiveUsing Session Manager to provide secure EC2 access, whilst improving incident response capabilities with activity recording.Jul 285Jul 285
Andrew BloomanUse AWS Permission Boundaries to Safeguard Your Cloud!Empower developers to build, within GuardrailsJul 23Jul 23
Andrew BloomanStop using AWS IAM Keys! Here’s how!How to improve your IAM posture without sacrificing productivity.Jul 181Jul 181
Andrew BloomanStop Using Public S3 Buckets! Here’s how!An end to Public S3 buckets for Static web hostingJul 15Jul 15
Andrew BloomanAWS Security Controls & NIST CSFAligning Cloud Posture to the latest Framework from NISTJul 14Jul 14