PinnedAndrew BloomaninOSINT TeamBuild Your Own Cyber Threat Intelligence System…at Home!Learn how to collect Threat Intelligence for freeAug 215Aug 215
PinnedAndrew BloomaninAWS TipStop using SSH in AWS! Here’s Why! A DevSecOps PerspectiveUsing Session Manager to provide secure EC2 access, whilst improving incident response capabilities with activity recording.Jul 2811Jul 2811
Andrew BloomanCyber Security Certifications, Do You Really Need Them?My Own Personal Development Journey With Certifications7h ago7h ago
Andrew Blooman8 AWS Security Services Every DevSecOps Engineer Must KnowDeep dive into the most valuable AWS services for Security14h ago14h ago
Andrew BloomanSecure Your Code With GitHub Actions & Open-Source ToolsSecure Code Review for Terraform Code and Docker Images using checkov, tfsec and trivySep 291Sep 291
Andrew BloomanCloud Sprawl: The Real Reason Why Migrating to the Cloud FailsStop Treating AWS as “Another Datacenter”Sep 272Sep 272
Andrew BloomaninITNEXTContainer Security ScanningKeep your containers vulnerability free and securely configuredSep 221Sep 221
Andrew BloomanContainer Security StandardsSecure Your Containers With a Few Simple ChangesSep 183Sep 183
Andrew BloomanWhat is Vulnerability Management?The Beginners Guide to understanding VulnerabilitiesSep 14Sep 14
Andrew BloomaninAWS TipTerraform Best Practices For AWSUsing Terraform the Right Way for the AWS CloudSep 134Sep 134