Все публикации

Defending Against Path Traversal Attacks

Evolution of SIEM in the Cloud

Centralizing Cloud Logs and Events with Microsoft Sentinel

Operating System Command Injection

HANDS-ON WORKSHOP: Prevent Remote Code Executions with Private Endpoints: Aviata Chapter 2

Preventing SQL Injection in Python

JWTs The Good, the Bad, and the Ugly Security Edition

Secure Service Configuration Poster Resource Demo

Cloud Flight Simulator Part 4: Least Privileged Pods with Kubernetes Workloads

Cloud Flight Simulator Part 1: GitLab CI, Workflows, and Secrets

2024 Cloud Security Trends and Predictions

Fred Bret-Mounet: Eating Pasta and Not Building Fort Knox | Season 2 Ep9

Get to Know Brandon Evans, SANS Certified Instructor, Lead Author of SANS SEC510

How Ramp Manages Authorization in the Cloud and Achieves Least Privilege

Practical Security Monitoring and Response in Microsoft Azure

Beyond the Perimeter: Uncovering the Hidden Threat of Data Exfiltration in Google Cloud Platform

Real World Lessons Learned from 18 months of CIEM implementations in the Enterprise

Detective Controls in K8s Environments – Wrangling Security Data Out Of Your Clusters

Cloud Security: What Works and What Doesn't

Keynote | Go Beyond Gatekeeping: A Systems Design Approach to Security Engineering

Modernizing Cloud Vulnerability Management with Serverless, Containers, and IaC

Scaling Identity & Access in Multi-Account Enterprises: Complexities & Strategies for Effective IAM

Top 10 Azure Security Tips From 10 Years of Securing Azure Applications

Policy as Code: strengthening governance and security in cloud infrastructure