Costas KourmpoglouThe shared responsibility of credential stuffingIf your account falls victim to a credential stuffing attack, whose responsibility is it ?5 min read·Jan 17, 2023--1--1
Costas KourmpoglouinAirwalk ReplyAWS IAM and Cross Account AttacksAll about AWS IAM cross account trusts and how they can be used to gain an initial foothold or persistence to an AWS Account.7 min read·Oct 12, 2021----
Costas KourmpoglouinAirwalk ReplyContinuous Compliance in the CloudThe importance of cloud security posture management, the need for automation, and codification of controls in cloud security.7 min read·Sep 14, 2021----
Costas KourmpoglouinAirwalk ReplyJust enough PAMIn this post, I’m going to showcase how you can build just enough Privileged Access Management, using only AWS services.8 min read·Jun 8, 2021----
Costas KourmpoglouinAirwalk ReplyBreaking down the AWS Lambda Shared Responsibility ModelThe aim is to give you a high-level — non-exhaustive — overview of the core areas of Lambda security along with a reusable pattern8 min read·Apr 27, 2021--1--1
Costas KourmpoglouQuerying and Visualising OctoDNS records with Neo4jOctoDNS provides a toolset for managing DNS records across multiple providers. Built by Github and using a typical YAML structure, to…3 min read·Sep 19, 2020----
Costas KourmpoglouThe economics of credential stuffing attacksIf you run a website with a login form, you have either experienced a credential stuffing attack or it has gone undetected.7 min read·Jun 4, 2020----
Costas KourmpoglouinFT Product & TechnologyThreat modelling at the FTBy Lisa Fiander and Costas K6 min read·May 11, 2020----
Costas KourmpoglouBuild your own keyboardOut of all the peripherals out there, I like keyboards the most.4 min read·Nov 4, 2018--2--2