Introducing CloudSec.Cybr
One day I was looking at a mess of notes I’ve created and collected from years’ worth of research, learning, and experience. I couldn’t help…
One day I was looking at a mess of notes I’ve created and collected from years’ worth of research, learning, and experience. I couldn’t help…
Securing your AWS accounts and environments starts with implementing AWS IAM best practices. Get this right and you will have a solid security foundation. Get…
In this lab walkthrough, we’re going to take a look at how to enumerate the AWS Secrets Manager service in order to better understand how…
I love working in AWS…but sometimes it makes you want to pull your hair out because it doesn’t behave the way you expect it to…
In mid-2023, we launched our first version of our 🧪 Hands-On Labs platform. After getting fantastic early feedback from our learners, the labs officially graduated…
Our live presentation on Attacking & Defending Amazon EKS sparked interesting questions and conversations regarding the biggest threats to Amazon EKS (and Kubernetes in general). A…
Sometimes the hardest part is knowing where to start studying for an exam. With so much to learn and so many different topics, what should…
Are you keeping your data stored in AWS safe? Amazon S3 has multiple controls you can use to protect your data. Let’s take a look:…
My AWS access keys were exposed and are being exploited by a threat actor. What do I do?!?! Step 1: Don’t panic! I’ve got you.…
Learning how to keep your Amazon S3 buckets safe and finding weak spots in bucket policies is an important part of managing AWS resources and…
Please confirm you want to block this member.
You will no longer be able to:
Please allow a few minutes for this process to complete.