Jason DykeinScaleSecAccess GCP from AWS using Workload Identity FederationWritten in collaboration with Ilan Ponimansky.Mar 11, 20211Mar 11, 20211
Jason DykeinScaleSecIdentify Unused Service Accounts in GCPEasily find and identify unused service accounts across your entire GCP organization.Feb 25, 2021Feb 25, 2021
Jason DykeinScaleSecOverview of Google Cloud Function IdentitiesProperly scope your cloud functions to limit security risks on Google Cloud Platform.Dec 10, 2020Dec 10, 2020
Jason DykeinScaleSecre:Invent Security re:Cap: Week 1Our favorite security announcements from AWS re:Invent — Week 1Dec 10, 2020Dec 10, 2020
Jason DykeinScaleSecAnnouncing Project LockdownProject Lockdown is a collection of automated remediations that react in real time to keep your GCP environment secure.Nov 18, 2020Nov 18, 2020
Jason DykeinScaleSecAnnouncing the GCP Organization Policy NotifierTrack GCP Org Policy Updates on Twitter and SlackAug 6, 2020Aug 6, 2020
Jason DykeinScaleSecSecurity Best Practices for Amazon Elasticsearch — Part 2Secure your Amazon Elasticsearch cluster using our recommended best practices.Jul 28, 2020Jul 28, 2020
Jason DykeinScaleSecSecurity Best Practices for Amazon Elasticsearch — Part OneSecure Your Amazon Elasticsearch Cluster Using Our Recommended Best Practices.Jul 7, 2020Jul 7, 2020
Jason DykeinScaleSecInventory Your GCP API KeysInventory, analyze, and report on your GCP API keys in an automated fashion.Jun 11, 2020Jun 11, 2020
Jason DykeinScaleSecAutomate Security on GCP with Event Threat DetectionLeverage GCP Cloud Functions and Event Threat Detection to automate your cloud security response.Apr 9, 2020Apr 9, 2020