PinnedAndrew BloomanBuild Your Own Cyber Threat Intelligence System…at Home!Learn how to collect Threat Intelligence for freeAug 23Aug 23
PinnedAndrew BloomanStop using SSH in AWS! Here’s Why! A DevSecOps PerspectiveUsing Session Manager to provide secure EC2 access, whilst improving incident response capabilities with activity recording.Jul 287Jul 287
Andrew BloomanHow to Block Ads and Unwanted Network Traffic Using Pi-HoleDNS ad blocking for the masses4h ago4h ago
Andrew BloomanSecurity Engineering is Dead. It’s time to Adopt Platform SecurityRedefining roles in an ever changing security landscape22h ago22h ago
Andrew BloomanStop Hackers from Exploiting EC2 Instances — Here's How!Update to IMDSv2 to reduce the attack surface for your EC2 instances5d ago5d ago
Andrew Blooman10 Essential Tips to Become a Successful Platform Security EngineerGuidance for aspiring security engineersJul 31Jul 31
Andrew BloomanAdvanced AWS IAM Concepts. Permission BoundariesEmpower developers to build, within GuardrailsJul 23Jul 23
Andrew BloomanStop using AWS IAM Keys! Here’s how!How to improve your IAM posture without sacrificing productivity.Jul 181Jul 181
Andrew BloomanUse AWS CloudFront to Secure S3 Buckets for Static WebsitesAn end to Public S3 buckets for Static web hostingJul 15Jul 15
Andrew BloomanAWS Security Controls & NIST Cyber Security FrameworkAligning Cloud Posture to the latest Framework from NISTJul 14Jul 14