Season 3

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
post

Story of a Cloud Architect & Blurry Lines of Control with AWS

BECOME A CLOUD SECURITY ARCHITECT IN 2023

AWS Threat Detection for NOT SO COMMON AWS Services Explained

RANSOMWARE & SUPPLY CHAIN ATTACKS IN AWS

HOW TO BECOME A CLOUD NATIVE SECURITY ARCHITECT

Compliance as Code in Kubernetes

Software Signing for Kubernetes Supply Chain & Everybody Else

KUBERNETES BEST PRACTICES 2022

Building Blocks of Cloud Security Program

Cloud Security Monitoring in Modern Security Security Stack

API Security Best Practice 2022

Hacker Summer Camp 2022 : The Cloud Security Edition

How to Threat Model the Digital Supply Chain in Cloud

HOW TO SECURE Container environment FOR FINANCIAL SERVICES

Fundamentals of AWS Cloud Security Assessment

HOW TO SECURE AWS CLOUD ENVIRONMENT FOR HEALTHCARE

Zero Trust the Triple Paradox

Building & Scaling AWS Security Guardrails

FIXING THAT BROKEN DIGITAL SUPPLY CHAIN

3 THINGS THAT BROKE THE DIGITAL SUPPLY CHAIN

Digital Transformation – Are we there yet?

CISO Perspective: Sean Catlett, Slack CISO

CyberSecurity Asset Management for the Modern Security Stack

Azure Security Fundamentals – Level 200

Confidential Computing in Azure Explained

Azure Cloud Security Architecture

Azure Security Fundamentals – Level 1

Finding Security Holes in Azure Services

Azure Kubernetes Service (AKS) Security Explained

Azure Security Fundamentals – Zero Trust with Azure AD

How to Secure Cloud Managed Kubernetes

Kubernetes Security Best Practices in 2022

Manage Privileged Access for Kubernetes & Cloud

How to become a Cloud Native Security Engineer

Service Mesh Security Explained!

Scaling a Practical AWS Asset Management Program

Threat Hunting in AWS

What is SBOM, iBOM?

Security for AI/ML Models in AWS

Building Google Cloud Security Products

Google Cloud Security Fundamentals – Level 2

Google Cloud Security Fundamentals

Red Team in Google Cloud

How to Automate Security in Google Cloud?

Authorization Control for Enterprise in Cloud

AWS IAM Getting Started

Secret Management for Modern Apps Explained

CISO in a Cloud World in 2022

Building Modern Identity (IAM) Roadmap for Cloud

Building Scalable Authorization in Cloud Native Apps

Recommend a topic

Partner with us

Join the team