Forem

# cloudsecurity

Securing cloud environments like AWS, Azure, and GCP, including configurations and services.

Posts

๐Ÿ‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Fortify Your Cloud with Unbreakable DDoS Protection: Unleash the Power of AWS Shield
Cover image for Fortify Your Cloud with Unbreakable DDoS Protection: Unleash the Power of AWS Shield

Fortify Your Cloud with Unbreakable DDoS Protection: Unleash the Power of AWS Shield

5
Comments
7 min read
Mastering Cloud Security: Insights from Aviatrix Immersion Day on Distributed Firewalls.
Cover image for Mastering Cloud Security: Insights from Aviatrix Immersion Day on Distributed Firewalls.

Mastering Cloud Security: Insights from Aviatrix Immersion Day on Distributed Firewalls.

Comments
2 min read
Securing Your Data in AWS : A Practical Guide
Cover image for Securing Your Data in AWS : A Practical Guide

Securing Your Data in AWS : A Practical Guide

2
Comments
4 min read
Securing the Cloud Frontier: Generative AI for Vulnerability Hunting

Securing the Cloud Frontier: Generative AI for Vulnerability Hunting

1
Comments
4 min read
AWS Security Hub
Cover image for AWS Security Hub

AWS Security Hub

Comments
4 min read
Forging Impenetrable AWS Identities: Safeguarding the Root User and IAM Users
Cover image for Forging Impenetrable AWS Identities: Safeguarding the Root User and IAM Users

Forging Impenetrable AWS Identities: Safeguarding the Root User and IAM Users

5
Comments
7 min read
The Ultimate Guide to Building a Secure Cloud Infrastructure
Cover image for The Ultimate Guide to Building a Secure Cloud Infrastructure

The Ultimate Guide to Building a Secure Cloud Infrastructure

1
Comments
3 min read
What is Azure Bastion: An In-Depth Guide to Enhanced Connectivity
Cover image for What is Azure Bastion: An In-Depth Guide to Enhanced Connectivity

What is Azure Bastion: An In-Depth Guide to Enhanced Connectivity

3
Comments 1
3 min read
Explore What is Azure Monitor: Features, Benefits, and Use Cases
Cover image for Explore What is Azure Monitor: Features, Benefits, and Use Cases

Explore What is Azure Monitor: Features, Benefits, and Use Cases

2
Comments 2
3 min read
Cybersecurity and the State of the Modern Threat Landscape: A Deep Dive on CNAPPs
Cover image for Cybersecurity and the State of the Modern Threat Landscape: A Deep Dive on CNAPPs

Cybersecurity and the State of the Modern Threat Landscape: A Deep Dive on CNAPPs

Comments
10 min read
Explore Cloud Security Management: Everything You Need to Know
Cover image for Explore Cloud Security Management: Everything You Need to Know

Explore Cloud Security Management: Everything You Need to Know

5
Comments 4
4 min read
Trust and Transparency in Cloud Computing

Trust and Transparency in Cloud Computing

Comments
2 min read
AWS CI CD SETUP
Cover image for AWS CI CD SETUP

AWS CI CD SETUP

35
Comments
3 min read
Tactical Cloud Audit Log Analysis with DuckDB - AWS CloudTrail
Cover image for Tactical Cloud Audit Log Analysis with DuckDB - AWS CloudTrail

Tactical Cloud Audit Log Analysis with DuckDB - AWS CloudTrail

12
Comments 2
3 min read
Tips to Maintain Strong Cloud Security

Tips to Maintain Strong Cloud Security

Comments
2 min read
Services that can integrate with AWS Certificate Manager and their Use Case
Cover image for Services that can integrate with AWS Certificate Manager and their Use Case

Services that can integrate with AWS Certificate Manager and their Use Case

Comments 2
3 min read
Issue 36 of AWS Cloud Security Weekly
Cover image for Issue 36 of AWS Cloud Security Weekly

Issue 36 of AWS Cloud Security Weekly

Comments
2 min read
Automatic source locations with Rego
Cover image for Automatic source locations with Rego

Automatic source locations with Rego

1
Comments
10 min read
Issue 35 of AWS Cloud Security Weekly
Cover image for Issue 35 of AWS Cloud Security Weekly

Issue 35 of AWS Cloud Security Weekly

2
Comments
2 min read
A Deep Dive into OCSF & VEX - Unified Standards for Security Management
Cover image for A Deep Dive into OCSF & VEX - Unified Standards for Security Management

A Deep Dive into OCSF & VEX - Unified Standards for Security Management

6
Comments
6 min read
When Automation Meets Authentication
Cover image for When Automation Meets Authentication

When Automation Meets Authentication

Comments 1
5 min read
How to run an AWS CIS v3.0 assessment in CloudShell

How to run an AWS CIS v3.0 assessment in CloudShell

6
Comments
2 min read
Bridging the Cloud Security Gap: From Innovation to Operational Integration

Bridging the Cloud Security Gap: From Innovation to Operational Integration

Comments
2 min read
Comprehensive re:Cap security practice on AWS
Cover image for Comprehensive re:Cap security practice on AWS

Comprehensive re:Cap security practice on AWS

8
Comments 2
17 min read
๐๐ž๐ฐ ๐œ๐จ๐ฎ๐ซ๐ฌ๐ž๐ฌ ๐š๐ง๐ ๐š๐ง๐ ๐œ๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐จ๐Ÿ๐Ÿ๐ž๐ซ๐ข๐ง๐ ๐ฌ ๐Ÿ๐ซ๐จ๐ฆ ๐€๐–๐’ ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐  ๐š๐ง๐ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐ข๐ง ๐‰๐š๐ง๐ฎ๐š๐ซ๐ฒ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ’

๐๐ž๐ฐ ๐œ๐จ๐ฎ๐ซ๐ฌ๐ž๐ฌ ๐š๐ง๐ ๐š๐ง๐ ๐œ๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐จ๐Ÿ๐Ÿ๐ž๐ซ๐ข๐ง๐ ๐ฌ ๐Ÿ๐ซ๐จ๐ฆ ๐€๐–๐’ ๐“๐ซ๐š๐ข๐ง๐ข๐ง๐  ๐š๐ง๐ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐š๐ญ๐ข๐จ๐ง ๐ข๐ง ๐‰๐š๐ง๐ฎ๐š๐ซ๐ฒ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ’

Comments
1 min read
loading...