F ASecuring and Assessing Your Amazon AWS EnvironmentAmazon AWS has a robust product offering that includes a number of security features. Trying to make sense and configuring all of them is…Sep 16, 2017Sep 16, 2017
LinodeinLinode CubeAn SMB Guide for Migrating to the CloudBy Jack M. GermainMar 21, 20171Mar 21, 20171
CloudSploitinCloudSploitIntroducing CloudSploit EventsCloudSploit Events is a new product release from CloudSploit, enabling real-time security analysis of API activity across an entire AWS…Mar 8, 2017Mar 8, 2017
CloudSploitinCloudSploitAWS Outage — Feb 28thOn February 28th, at approximately 2:30 PM EST, AWS experienced issues with their S3 service, resulting in cascading failures across…Mar 1, 2017Mar 1, 2017
CloudSploitinCloudSploitCloudSploit Integrates with OpsGenieWhen it comes to security tools, you can never have enough integrations with third-party tools. One such integration that our customers…Feb 20, 2017Feb 20, 2017
CloudSploitinCloudSploitElevating Permissions in AWS IAMPrivilege escalation, in the traditional sense, is “a type of network intrusion that takes advantage of programming errors or design flaws…Feb 18, 2017Feb 18, 2017
CloudSploitinCloudSploitCloudSploit Support for 3 New AWS Regions: Ohio, Montreal, and LondonOver the past several months, AWS has steadily been adding new regions to its catalog of global locations. Most recently, AWS has added a…Jan 11, 2017Jan 11, 2017
CloudSploitinCloudSploitCloudSploit Historical Analysis for AWS SecurityIn working with some of our larger customers, one request that frequently comes up is the ability to see which of many AWS accounts are in…Dec 25, 2016Dec 25, 2016