Forem

# cloudsecurity

Securing cloud environments like AWS, Azure, and GCP, including configurations and services.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Google Agreed to Pay $32 Billion for Wiz. Here's Why Cloud Security Was Worth Every Dollar.

Google Agreed to Pay $32 Billion for Wiz. Here's Why Cloud Security Was Worth Every Dollar.

Comments
6 min read
Microsoft Azure Management Tasks: Control storage access
Cover image for Microsoft Azure Management Tasks: Control storage access

Microsoft Azure Management Tasks: Control storage access

2
Comments
6 min read
Microsoft Azure Management Tasks: Update the Virtual Network
Cover image for Microsoft Azure Management Tasks: Update the Virtual Network

Microsoft Azure Management Tasks: Update the Virtual Network

2
Comments
3 min read
Tools for Device Security Posture Monitoring
Cover image for Tools for Device Security Posture Monitoring

Tools for Device Security Posture Monitoring

Comments
2 min read
Securing Non-Human Identities in Cloud Environments

Securing Non-Human Identities in Cloud Environments

Comments
7 min read
Kubernetes Cluster Attacks Surge in 2026: How to Harden Your K8s

Kubernetes Cluster Attacks Surge in 2026: How to Harden Your K8s

Comments
3 min read
awsmap v1.5.0: Your AWS Inventory Now Has a Brain

awsmap v1.5.0: Your AWS Inventory Now Has a Brain

Comments
6 min read
Why Your Cloud Security is Probably "Security by Hope" (And How to Fix It)

Why Your Cloud Security is Probably "Security by Hope" (And How to Fix It)

Comments
5 min read
Beyond Dashboards: The Architect as a Strategic Translator 🛡️
Cover image for Beyond Dashboards: The Architect as a Strategic Translator 🛡️

Beyond Dashboards: The Architect as a Strategic Translator 🛡️

Comments
1 min read
The Dual Front Insider Threat: AI Agents and Nation State Infiltrators Redefine Cloud Security
Cover image for The Dual Front Insider Threat: AI Agents and Nation State Infiltrators Redefine Cloud Security

The Dual Front Insider Threat: AI Agents and Nation State Infiltrators Redefine Cloud Security

Comments
5 min read
Event-Driven EC2 Isolation in AWS: Building a Minimal Cloud SOAR Without Buying One
Cover image for Event-Driven EC2 Isolation in AWS: Building a Minimal Cloud SOAR Without Buying One

Event-Driven EC2 Isolation in AWS: Building a Minimal Cloud SOAR Without Buying One

1
Comments 2
3 min read
Inside AMD SEV: How memory encryption works today(and where it is lacking)
Cover image for Inside AMD SEV: How memory encryption works today(and where it is lacking)

Inside AMD SEV: How memory encryption works today(and where it is lacking)

Comments
3 min read
The Death of CSPM: Why Finding Cloud Issues Isn’t Enough Anymore

The Death of CSPM: Why Finding Cloud Issues Isn’t Enough Anymore

Comments
2 min read
The Invisible Perimeter: Why Zero Day Vulnerabilities Are Now a Boardroom Crisis
Cover image for The Invisible Perimeter: Why Zero Day Vulnerabilities Are Now a Boardroom Crisis

The Invisible Perimeter: Why Zero Day Vulnerabilities Are Now a Boardroom Crisis

Comments
5 min read
Episode 5: Load Balancer Security Auditor — SSL, Protocols, and Public Exposure

Episode 5: Load Balancer Security Auditor — SSL, Protocols, and Public Exposure

Comments
7 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.