InDecathlon DigitalbyRay El KhouryIdentifying security risks in our SaaS applicationsA homemade SSPM framework to uncover SaaS security risks3d ago
Or AspirHands-On Security Tips For Centralize Root Access In AWS(AssumeRoot)TL;DR: AWS has introduced a centralized root access management feature for AWS Organizations. This blog covers why this is important, how…Nov 28
Anshumaan SinghComprehensive Guide to Prisma Cloud: Securing Secrets, SCA Vulnerabilities, Licenses, IaC…IntroductionNov 26Nov 26
InSnowflake Builders Blog: Data Engineers, App Developers, AI/ML, & Data SciencebyJake BerkowskySecurity Analytics with Wiz and SnowflakeA high value, low effort way to boost your security programFeb 7Feb 7
Steve AluochContinuous Monitoring and Compliance in Multi-Cloud EnvironmentsWriting Inspired by My Google Cybersecurity Certificate ProjectsNov 27Nov 27
InDecathlon DigitalbyRay El KhouryIdentifying security risks in our SaaS applicationsA homemade SSPM framework to uncover SaaS security risks3d ago
Or AspirHands-On Security Tips For Centralize Root Access In AWS(AssumeRoot)TL;DR: AWS has introduced a centralized root access management feature for AWS Organizations. This blog covers why this is important, how…Nov 28
Anshumaan SinghComprehensive Guide to Prisma Cloud: Securing Secrets, SCA Vulnerabilities, Licenses, IaC…IntroductionNov 26
InSnowflake Builders Blog: Data Engineers, App Developers, AI/ML, & Data SciencebyJake BerkowskySecurity Analytics with Wiz and SnowflakeA high value, low effort way to boost your security programFeb 7
Steve AluochContinuous Monitoring and Compliance in Multi-Cloud EnvironmentsWriting Inspired by My Google Cybersecurity Certificate ProjectsNov 27
InXint BlogbyXintWhat CSPM and EASM Can’t Do — The Future of Cybersecurity With Unified Security Posture ManagementExplore why USPM is essential for modern businesses and how it addresses critical security challenges.Jul 12
Anshumaan SinghComprehensive Guide to CSPM Hardening Controls in Google Cloud Platform (GCP)Securing cloud environments is paramount in today’s digital landscape, where misconfigurations and excessive permissions are common…Nov 18
Ajay KumarMicrosoft Defender Cloud Security Posture Management (CSPM) — A Pillar for Multi Cloud Security…65 to 70 percent of all security challenges in the cloud arise from misconfigurations.Mar 16, 2023