Abhiramcloudbuddy.hashnode.dev·Oct 11, 2024The Human Element of Cybersecurity: A Deep DiveIn today's complex digital landscape, cybersecurity is a multifaceted challenge that requires a holistic approach. While technology plays a vital role in protecting organizations from threats, the human element is equally critical. In a recent episod...Discusscloud security awareness
Abhiramcloudbuddy.hashnode.dev·Oct 1, 2024Prioritizing Cloud AssetsIn today's cloud-first world, organizations are increasingly relying on cloud computing to meet their business needs. However, managing cloud assets effectively can be a complex and challenging task. Without a proper cloud asset management (CAM) syst...Discusscloud asset management
Tanishka Marrottcloud-design-diaries.hashnode.dev·Aug 11, 2024Crafting a Holistic Security Posture with Organization Policy Constraints (OPCs) and Service Control Policies (SCPs)As a member of the cloud security team, it’s crucial to understand how these tools work, their technical implementations, and the scenarios where exceptions might be necessary. Let’s explore the top 5 OPCs and SCPs that can bolster your organization'...Discuss·1 likeAWS
Tanishka Marrottcloud-design-diaries.hashnode.dev·Jul 28, 2024Implementing VPC Service Controls with Terraform on GCPIn the rapidly evolving landscape of cloud computing, securing your resources and data is paramount. Google Cloud Platform - GCP offers VPC Service Controls as a robust security feature to help mitigate data exfiltration risks. In this article, we'll...Discuss·1 likevpc-service controls
Ikoh Sylvaikohsylva.hashnode.dev·Jun 29, 2024Best Practices for AWS Identity Security: Root and IAM UsersIn the ever-evolving landscape of cloud computing, Amazon Web Services (AWS) has emerged as a dominant force, offering a vast array of services and solutions to businesses of all sizes. As organizations continue to migrate their operations to the AWS...Discuss·16 likesCloud Computing
ishan ghutakeazishan.hashnode.dev·Sep 4, 2023Azure Service EndpointsAzure service endpoints are like secret tunnels that connect your virtual network to Azure services, and they help keep your stuff safe by only letting the right things through. Imagine you have a magical treehouse 🌳🏠: Treehouse: Your treehouse ...Discusscloud security architecture