Loading. Please wait.

BLOG

Experience Smart Automation
bt_bb_section_bottom_section_coverage_image

Cloud Security Series #10

Cloud Security Series #10

Observability In the original postwe defined steps to implement a bullet-proof Cloud Infrastructure Security Posture. Now it’s time to dive into the topic of 🔍 Observability. ❓ How would you approach the implementation of the following?– Implement Centralized Logging (from cloud services and applications);– Configure Alerts on Critical and High Impact VMS Events. 💪 Here...

Cloud Security Series #9

Cloud Security Series #9

Antivirus Scanning and Security Patching In the original post we defined steps to implement a bullet-proof Cloud Infrastructure Security Posture. Now it’s time to dive into the topic of 🎯 Vulnerability Management. See– Part 1: Hosts– Part 2: Containers to learn about hardening pipelines for AMIs and container images, and– Part 3: Scanning at Runtime...

Cloud Security Series #8

Cloud Security Series #8

Vulnerability Scanning at Runtime 🎯 Vulnerability Management System (“VMS”). Part 3: Scanning at Runtime. In the original post we defined steps to implement a bullet-proof Cloud Infrastructure Security Posture. Now it’s time to dive into the topic of 🎯 Vulnerability Management. See Part 1: Hosts and Part 2: Containers to learn about hardening pipelines for...

Cloud Security Series #6

Cloud Security Series #6

Vulnerability Management System (“VMS”) In the original post we defined steps to implement a bullet-proof Cloud Infrastructure Security Posture. Now it’s time to dive into the topic of 🎯 Vulnerability Management. ❓ How would you approach the implementation of the following?– Scan container images, applications, hosts for Vulnerabilities;– Perform Regular Host and Container Security Patching...