
Security Chaos Engineering VS. traditional security approaches 3/4
After introducing Security Chaos Engineering (SCE) as a potential approach to cloud security, we look at important differences between SCE and traditional security approaches. We
After introducing Security Chaos Engineering (SCE) as a potential approach to cloud security, we look at important differences between SCE and traditional security approaches. We
Complex AWS environment tend to have users or roles with more privileges granted than they really need. Finding those users and roles can be a time-consuming activity, so tool-support is needed for this task. CloudTracker is an Open-Source-tool for analyzing users, roles and their granted and used privileges.
CloudMapper is an open-source tool with features to generate maps and reports. It helps us to analyze complex AWS environments of our clients.
As many other conferences worldwide, AWS re:Invent will take place as a free, 3-week virtual conference this year from Nov. 30 until December 18. Attendees have the choice between keynotes, sessions and trainings in three different time zones.
Alice&Bob.Company and Crashtest Security – a strong partnership enabling thorough vulnerability testing. Penetration Testing is an important function in any cyber security strategy.
When building your own infrastructure in the cloud, Security must be the first concern on your mind. On this article I will explain 10 basic steps to increase your security and therefore harden your whole deployment.
Alice&Bob.Company convinced its client solarisBank with in-depth knowledge and broad experience.
In collaboration with platform and product teams, the overall security posture has been significantly improved.
The latest events are forcing many companies to establish new processes and to quickly switch to remote work and home office.