Google Cloud Platform: What Is It, and Should You Use It?

This guide covers the Google Cloud Platform, its pros and cons and everything a business needs to know about its portfolio. Continue reading Google Cloud Platform: What Is It, and Should You Use It?

From Google Cloud Blog: “New whitepaper: Designing and deploying a data security strategy with…

From Google Cloud Blog: “New whitepaper: Designing and deploying a data security strategy with Google Cloud”
Here is another very fun resource we created (jointly with Andrew Lance from Sidechain), a paper on designing and running data security strateg… Continue reading From Google Cloud Blog: “New whitepaper: Designing and deploying a data security strategy with…

Google Cloud Anthos update brings support for on-prem, bare metal

When Google announced Anthos last year at Google Cloud Next, it was a pretty big deal. Here was a cloud company releasing a product that purported to help you move your applications between cloud companies like AWS and Azure  — that would be GCP’s competitors — because it’s what customers demanded. Google tapped into genuine […] Continue reading Google Cloud Anthos update brings support for on-prem, bare metal

Shifting Cloud Security Left with Infrastructure as Code

Introduction and Executive Summary DevOps and the continuous integration/continuous deployment (CI/CD) pipeline are revolutionizing application development, test, and cloud delivery, enabling developers to write the application code and define the clou… Continue reading Shifting Cloud Security Left with Infrastructure as Code

This Week in Security: Robinhood, Apple Mail, ASLR, and More Windows 7

First off this week, a ransomware named Robinhood has a novel trick up its sleeve. The trick? Loading an old known-vulnerable signed driver, and then using a vulnerability in that driver to get a malicious kernel driver loaded.

A Gigabyte driver unintentionally exposed an interface that allows unfettered kernel level …read more

Continue reading This Week in Security: Robinhood, Apple Mail, ASLR, and More Windows 7

SOC Visibility and SIEM Tools – Jeff Costlow – BSW #145

SOC Visibility and SIEM Tools
The post SOC Visibility and SIEM Tools – Jeff Costlow – BSW #145 appeared first on Security Weekly. Continue reading SOC Visibility and SIEM Tools – Jeff Costlow – BSW #145

Attacking AWS: Elastic Map to Reduce Clusters – ESW #154

Attacking AWS: Elastic Map to Reduce Clusters
The post Attacking AWS: Elastic Map to Reduce Clusters – ESW #154 appeared first on Security Weekly. Continue reading Attacking AWS: Elastic Map to Reduce Clusters – ESW #154

Capital One Breach, Edgewise – Peter Smith – PSW #619

Capital One Breach, Edgewise
The post Capital One Breach, Edgewise – Peter Smith – PSW #619 appeared first on Security Weekly. Continue reading Capital One Breach, Edgewise – Peter Smith – PSW #619