GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!
GIVEAWAY
Win the ultimate AI security check with a free pentest giveaway!

Cloud Security

Why Visibility is an Essential Component of Your Application Security Approach

It’s funny how, over time, we accumulate knowledge that we encapsulate in a short phrase and then repeat it to each...
Oct 17, 2024
Est Read Time: 2 min

What is Cloud Penetration Testing? How PtaaS Increases Network Resilience

Cloud penetration testing can be the most effective way to increase your network's resilience.
Jun 26, 2024
Est Read Time: 6 min

A Comprehensive Guide to AWS Pentesting

Take a closer look at what AWS pentesting is and how you can perform a pentest on AWS.
Jun 29, 2023
Est Read Time: 6 min

Google Cloud Platform (GCP) Security Overview

In an evolving landscape, Google Cloud Platform (GCP) stands out with its comprehensive security model. It's designed...
Jun 6, 2023
Est Read Time: 6 min

10 Steps to Secure Your Azure Cloud Environment

The blog discusses ten essential steps to secure your Azure cloud environment, ranging from access management to network security. It emphasizes the use of Azure CLI to implement these best practices and safeguard against potential security threats. The steps include multifactor authentication, compliance standards, encryption, backups, and disaster recovery plans, among others.
Mar 29, 2023
Est Read Time: 11 min

Azure AD: Pentesting Fundamentals

Core member Orhan Yildirim walks us through how to use Azure AD when pentesting.
May 23, 2022
Est Read Time: 10 min

Google Cloud Workload Identity with Kubernetes and Terraform

A tutorial on improving your security posture with Google Kubernetes Engine workloads from our Senior Infrastructure Engineer, Nikola Velkovski.
Apr 26, 2022
Est Read Time: 8 min

How to Perform Azure Pentesting

Companies are benefiting from an increasing supply of cloud services. The ability to outsource features and functions...
Nov 17, 2021
Est Read Time: 3 min

Cloudy Features: 5 Best Practices for AWS, Azure and Cloud Security

As appeared in Cybersecurity Magazine.
Nov 17, 2020
Est Read Time: 4 min
    1 2