Automated detection of Risky Permissions in Kubernetes ClustersKubernetes uses an authorization module called Role-Based Access Control (RBAC) to set the utilization permissions for the different…Apr 8, 2021Apr 8, 2021
Incident Response in the Cloud (AWS)Part 1- Handling AWS Abuse Notifications{This blog series is an effort from me to raise awareness about IR and threat detection in the Cloud. In this blog post we will be…Sep 25, 2019Sep 25, 2019