Forem

# cloudsecurity

Securing cloud environments like AWS, Azure, and GCP, including configurations and services.

Posts

šŸ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Beyond Dashboards: The Architect as a Strategic Translator šŸ›”ļø
Cover image for Beyond Dashboards: The Architect as a Strategic Translator šŸ›”ļø

Beyond Dashboards: The Architect as a Strategic Translator šŸ›”ļø

Comments
1 min read
The Dual Front Insider Threat: AI Agents and Nation State Infiltrators Redefine Cloud Security
Cover image for The Dual Front Insider Threat: AI Agents and Nation State Infiltrators Redefine Cloud Security

The Dual Front Insider Threat: AI Agents and Nation State Infiltrators Redefine Cloud Security

Comments
5 min read
Event-Driven EC2 Isolation in AWS: Building a Minimal Cloud SOAR Without Buying One
Cover image for Event-Driven EC2 Isolation in AWS: Building a Minimal Cloud SOAR Without Buying One

Event-Driven EC2 Isolation in AWS: Building a Minimal Cloud SOAR Without Buying One

1
Comments 2
3 min read
Inside AMD SEV: How memory encryption works today(and where it isĀ lacking)
Cover image for Inside AMD SEV: How memory encryption works today(and where it isĀ lacking)

Inside AMD SEV: How memory encryption works today(and where it isĀ lacking)

Comments
3 min read
The Death of CSPM: Why Finding Cloud Issues Isn’t Enough Anymore

The Death of CSPM: Why Finding Cloud Issues Isn’t Enough Anymore

Comments
2 min read
The Invisible Perimeter: Why Zero Day Vulnerabilities Are Now a Boardroom Crisis
Cover image for The Invisible Perimeter: Why Zero Day Vulnerabilities Are Now a Boardroom Crisis

The Invisible Perimeter: Why Zero Day Vulnerabilities Are Now a Boardroom Crisis

Comments
5 min read
Mitigant Threat Catalog: Turning Static Cloud Techniques to Dynamic Executions
Cover image for Mitigant Threat Catalog: Turning Static Cloud Techniques to Dynamic Executions

Mitigant Threat Catalog: Turning Static Cloud Techniques to Dynamic Executions

Comments
4 min read
OCI Generative AI Security: Dedicated GPUs, RDMA Networks, and Enterprise-Grade Data Protection

OCI Generative AI Security: Dedicated GPUs, RDMA Networks, and Enterprise-Grade Data Protection

1
Comments
9 min read
AI in Production Is a Cloud Problem First
Cover image for AI in Production Is a Cloud Problem First

AI in Production Is a Cloud Problem First

Comments
1 min read
Application Security - SAST, SCA & DAST
Cover image for Application Security - SAST, SCA & DAST

Application Security - SAST, SCA & DAST

1
Comments 1
4 min read
šŸ” Cloud Security Best Practices: How to Secure Cloud-Based Web Applications Without Slowing Down
Cover image for šŸ” Cloud Security Best Practices: How to Secure Cloud-Based Web Applications Without Slowing Down

šŸ” Cloud Security Best Practices: How to Secure Cloud-Based Web Applications Without Slowing Down

Comments
3 min read
Public vs Private Subnets in AWS - What Finally Made It Click for Me
Cover image for Public vs Private Subnets in AWS - What Finally Made It Click for Me

Public vs Private Subnets in AWS - What Finally Made It Click for Me

1
Comments
2 min read
MFA Fatigue Approval: When ā€œApproveā€ Becomes Your Weakest Link
Cover image for MFA Fatigue Approval: When ā€œApproveā€ Becomes Your Weakest Link

MFA Fatigue Approval: When ā€œApproveā€ Becomes Your Weakest Link

1
Comments
6 min read
Understanding AWS Network Firewall: Traffic Flow, Rules, and Logging
Cover image for Understanding AWS Network Firewall: Traffic Flow, Rules, and Logging

Understanding AWS Network Firewall: Traffic Flow, Rules, and Logging

Comments
3 min read
Beyond Backups: Building Verifiable Cloud Recovery on IBM Cloud

Beyond Backups: Building Verifiable Cloud Recovery on IBM Cloud

1
Comments 1
2 min read
šŸ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.