Cloud security

How to Build a Threat Hunting Capability in AWS

Introductions An infrastructure has been built, a patching plan has been developed, firewalls have been locked down and monitored, assets…

1 year ago

How Does the Shared Responsibility Model for Cloud Impacts Your Security Posture?

COVID-19 has changed the dynamic of operating business globally by transforming the traditional workplace. Working from home with a virtual…

2 years ago

What is Compliance in the Cloud? Challenges and Implementation of a Compliance Program

Compliance programs are created to discuss the threats and risks that involve a community or industry. First, an industry consortium…

2 years ago

ISO 27017- Information Security Control for Cloud Services

The use of cloud services is increasing worldwide as industries continue to grow. With this dynamic growth in cloud technology,…

3 years ago

AWS Pentesting – Part – 1

Nowadays, we have experienced many data breaches exposing different vulnerabilities like s3 buckets, compromised AWS cloud environments, and many more…

3 years ago