The Usual Suspects: A Look at Threat Actors Targeting the Cloud and their Battle for Superiority

Automating disk and memory evidence collection in AWS

All Your Trust Are Belong to Us

What I Wished Someone Told Me Before Going Multi-Account

Limiting Blast Radius by Automating IAM Policies using Policy Sentry

Janus: A Multi-Party Authorization Framework for Accessing Critical Cloud Resources

Security Onion Approach Towards IAM Roles

Building Cloud Security Automation at Scale

GCP Primitive Roles, An indictment

Automating Attack Simulation in the Cloud

It’s Time to Rethink the Shared Security Responsibility Model

Centralizing Identity across AWS, Azure and GCP

Kubernetes from an Attacker's Perspective

Winning in the Dark: Defending Serverless Infrastructure

Creating the AWS Account Controller — "Your rules don't apply to me"