InAnton on SecuritybyAnton ChuvakinBaby ASO: A Minimal Viable Transformation for Your SOCOne pattern I spotted after looking at the evolution of IT and security organizations over the years, including my time at Gartner is…Apr 19, 2024Apr 19, 2024
InMITRE ATT&CK®byAmy L. RobertsonATT&CK 2024 RoadmapEnhancing usability, expanding scope, optimizing defensesApr 18, 20241Apr 18, 20241
InGoogle Cloud - CommunitybyAmmett WPreparing for the Google Cloud Professional Cloud Security Engineer ExamSecurity is important to every organization. If you’re a cloud security professional, certification might be the right challenge for you.Jul 11, 20224Jul 11, 20224
Darek Bareckik8spacket is fully based on eBPF right nowk8spacket uses eBPF tracepoint and Traffic Control qdisc filters to collect information about TCP traffic and TLS connection metadata.Mar 9, 20241Mar 9, 20241
InGruntworkbyYevgeniy BrikmanIntroducing BoilerplateAn open source, cross-platform project generator / scaffolding toolMar 5, 20242Mar 5, 20242
InSystem WeaknessbyDavid MerianHack eBPF, Own LinuxThis feature for Linux kernels, eBPF (Extended Berkeley Packet Filter) is “technology that makes programming the kernel flexible, safe, and…Sep 5, 2023Sep 5, 2023
Sena YakutAWS re:Invent 2023: Security Session Notes 📝AWS re:Invent 2023 is completed in Las Vegas. I’ve watched some security-focused sessions and announcements online and I want to share my…Dec 2, 20231Dec 2, 20231
Leslie AlldridgeUse Terraform Test in v1.6.0 with example (No providers required)What to expect: We will be writing three simple unit tests to get you comfortable with the new files and testing flow in Terraform. No AWS…Oct 6, 20231Oct 6, 20231
InITNEXTbyKrzysztof PranczkA Practical Approach to SBOM in CI/CD Part II — Deploying Dependency-TrackThe article presents how to store and analyse Software Bill of Materials with OWASP Dependency-Track to identify security vulnerabilities…Sep 26, 20231Sep 26, 20231
InGitGuardianbySonya MoissetGitHub Security 101: Best Practices for Securing your RepositoryDevSecOps expert and GitHub Star Sonya Moisset shared with us her tips to improve your open-source repository’s security in a few simple…Sep 20, 2022Sep 20, 2022
InForto TechbyOded Ben-OzerAutomated Versioning of Terraform Modules with GitHub Actions, SemVer StyleProviding our Terraform modules monorepo with some release engineering loveNov 17, 20213Nov 17, 20213
InMiro EngineeringbyPeter BrindisiHow Miro leverages Open Policy Agent to implement authorization-as-a-serviceLearn about Miro’s challenges with authorization and how Open Policy Agent has helped Miro build a dedicated service for app authorization.May 31, 20232May 31, 20232
Muhammad Saad KhanPre-deployment Policy Checks for Terraform using OPA (Open Policy Agent)To achieve cloud compliance and improve security, many organizations depended on policies and procedures. Review processes has been…Jun 16, 20211Jun 16, 20211
InboostsecuritybyFrançois ProulxErosion of Trust: Unmasking Supply Chain Vulnerabilities in the Terraform RegistryJun 19, 2023Jun 19, 2023
BRK0018Implement Cloud Armor Security Policy/s using TerraformGoogle Cloud Armor helps you protect your Google Cloud deployments from multiple types of threats including DDoS [Distributed…Jan 19, 20223Jan 19, 20223
InThe SADA Engineering BlogbyRobert TellerUsing a host project to simplify your Google Cloud networkBy Robert Teller, SADA Sr. Solutions ArchitectJul 20, 2022Jul 20, 2022
InGoogle Cloud - CommunitybyHarshal RaneCentralised GCP Loadbalancer with Cross-project backend servicesGoogle Cloud Platform recently released the Centralised Loadbalancers feature in GA. Using this new service now it’s possible to have…Oct 25, 20221Oct 25, 20221
Inbetter appsecbyJames ChiappettaBuilding a Practical Secure Code Review ProcessA guide to structuring a secure code review process and why it’s important for every Application & Cloud Security team to have one.Apr 26, 20231Apr 26, 20231
Madhav BhattgcpHound : A Swiss Army Knife Offensive Toolkit for Google Cloud Platform (GCP)In this article, we will talk about a new tool written by me alongside Brad Richardson called “gcpHound” as well as some of the…Sep 7, 2021Sep 7, 2021
Chris Martin (@thatsiemguy)Enrichment in Chronicle SIEMChronicle SIEM now shows you enriched versus unenriched UDM fields, so you can quickly and easily see which fields have been enriched.Apr 5, 2023Apr 5, 2023