The shared responsibility of credential stuffingIf your account falls victim to a credential stuffing attack, whose responsibility is it ?Jan 17, 20231Jan 17, 20231
AWS IAM and Cross Account AttacksAll about AWS IAM cross account trusts and how they can be used to gain an initial foothold or persistence to an AWS Account.Oct 12, 2021Oct 12, 2021
Continuous Compliance in the CloudThe importance of cloud security posture management, the need for automation, and codification of controls in cloud security.Sep 14, 2021Sep 14, 2021
Just enough PAMIn this post, I’m going to showcase how you can build just enough Privileged Access Management, using only AWS services.Jun 8, 2021Jun 8, 2021
Breaking down the AWS Lambda Shared Responsibility ModelThe aim is to give you a high-level — non-exhaustive — overview of the core areas of Lambda security along with a reusable patternApr 27, 20211Apr 27, 20211
Querying and Visualising OctoDNS records with Neo4jOctoDNS provides a toolset for managing DNS records across multiple providers. Built by Github and using a typical YAML structure, to…Sep 19, 2020Sep 19, 2020
The economics of credential stuffing attacksIf you run a website with a login form, you have either experienced a credential stuffing attack or it has gone undetected.Jun 4, 2020Jun 4, 2020
Published inFT Product & TechnologyThreat modelling at the FTBy Lisa Fiander and Costas KMay 11, 2020May 11, 2020
Build your own keyboardOut of all the peripherals out there, I like keyboards the most.Nov 4, 20182Nov 4, 20182