AWS | Cloud | Security
How does the AWS Shared Responsibility Model work? AWS | Cloud | Security
Amazon Inspector 2 - What's new? Steyn Huizinga 03 Jan, 2022
AWS | Cloud | Python | Security
This is how you can test your cfn-guard rules Joris Conijn 29 Dec, 2021
Cloud | Google Cloud Platform | Security | Terraform
How to list Google services which support VPC Service Controls Mark van Holsteijn 22 Dec, 2021
DevSecOps | Security | Software Development
Log4J - A 10 step mitigation plan Cloud | Google Cloud Platform | Security
How to connect to a GKE private endpoint using the Identity Aware Proxy Mark van Holsteijn 11 Dec, 2021
AWS | Cloud | Security
How do you prove that your infrastructure is compliant Joris Conijn 23 Nov, 2021
Agile Transformation | Agile Architecture | DevOps | Security
The shift left fallacy Edzo Botjes 27 Aug, 2021
Cloud | Google Cloud Platform | Security | Technology
How to connect to CloudSQL with IAM authentication Mark van Holsteijn 19 May, 2021
AWS | Cloud | Cloud Security | Security
Defense in depth matters Steyn Huizinga 17 May, 2021
DevSecOps | Security
Secure Deployment: 10 Pointers on Secrets Management Cloud | AWS | Cloud Security | Security
Optimizing your security footprint in AWS — Part 2 Steyn Huizinga 07 Apr, 2021
Cloud | AWS | Cloud Security | Security
Optimizing your security footprint in AWS — Part 1 Steyn Huizinga 01 Apr, 2021