Managing Cloud Security Risk: Where Do You Start?
Operating your cloud infrastructure isn’t a one-time proposition, so it makes sense that securing it isn’t either. Establishing security compliance controls and then continuously monitoring those...
View ArticleHow Hackers Can Attack Your Amazon Web Services (AWS) Resources
Stolen credentials remain the number one action in cybersecurity breaches. However, attackers still have other routes to your systems and data. Once you secure your AWS IAM, where do you focus next? In...
View ArticleIdentity and Access Management in Amazon Web Services (AWS)
This blog post reviews best practices and pro tips for using Amazon Web Services securely, Identity and Access Management, and the risks faced when not setup correctly. The post Identity and Access...
View ArticleBuilding a Valid Threat Library for Cloud-Based Applications
Download this presentation to take a look at Azure and AWS components and how to leverage both when adding threat context and ultimately an amazing threat library to your application threat model. In...
View ArticleHow to Manage & Monitor Your Cloud Infrastructure
Use of public cloud infrastructure is now commonplace with nearly $60 billion spent annually. Of course, there are good reasons for this as Infrastructure and Platform as a Service provide several...
View ArticleVerSprite’s Cloud Security Assessment Platform (CSAP)
VerSprite's Cloud Security Assessment Platform is a tool to help organizations perform security scans across their overall AWS Cloud environment and individual accounts. Our dashboard and unique,...
View ArticleCloud Security Discussions and Advice on How to Move Your Business to the Cloud
Is your organization thinking of moving your assets and applications to the Cloud? Are you struggling to manage resources and risks in AWS, Microsoft Azure, or Google Cloud Platform (GCP)? In this...
View Article
More Pages to Explore .....