Posts
How to configure AWS Identity Center to use AzureAD
Building a successful cloud security program is more than just buying some tools. It's about understanding your business, defining your mission, and embracing your developers.
What to consider when you're looking to get an PenTest in AWS, along with our whitepaper guide on offensive operations in AWS
I deliberately published an Access Key and Secrets. Here's what happened.
At BSides Atlanta, I talked about how to handle an incident in AWS. The talk and this post are for those already familiar with the principles of Incident Response to understand what to do when the incident involves the AWS Control Plane.
There were 125 AWS Announcements in the last 10 days. Here are the ones I thought interesting, or security pros may care about.