Posts

How to configure AWS Identity Center to use Google Workspaces and Cloud Identities.

How to configure AWS Identity Center to use AzureAD

Building a successful cloud security program is more than just buying some tools. It's about understanding your business, defining your mission, and embracing your developers.

What to consider when you're looking to get an PenTest in AWS, along with our whitepaper guide on offensive operations in AWS
I deliberately published an Access Key and Secrets. Here's what happened.

At BSides Atlanta, I talked about how to handle an incident in AWS. The talk and this post are for those already familiar with the principles of Incident Response to understand what to do when the incident involves the AWS Control Plane.