Posts
Introducing the Universal Cloud Threat Model - a model anyone can use to cover 90% of the cloud attacks they may experience.
Defining Security Invariants for safely leveraging Service Control Policies and Auto Remediation, with examples.
Everyone has a preferred cloud provider and you probably govern that one pretty well. But like it or not, your organization is using the other providers and you need to govern them too. This blog post covers the minimum things to do in your non-preferred providers.
How to leverage AWS Backup to protect you from account compromise and ransom attacks
How to configure AWS Identity Center to use Google Workspaces and Cloud Identities.
How to configure AWS Identity Center to use Google Workspaces and Cloud Identities.