How many of your GCP buckets are publicly accessible? It might be more than you think...
Take a look at Lightspin's examination of GCP's storage service, how to access buckets, and how to make sure your buckets are configured as intended.
Jonathan is the new Chief Information Security Officer, joining us from IHS Markit, a global information services company, where he ran Cloud & Offensive Security and created a security data graph project with his team. Jonathan has held roles at AWS, NBCUniversal, Blue Cross/Blue Shield and is a US Army veteran. Outside of work Jonathan works on his blog, open source projects, spends time with his 2 daughters and practices home cooking, research in military histories of the world, and travels around the East Coast of the US.
Take a look at Lightspin's examination of GCP's storage service, how to access buckets, and how to make sure your buckets are configured as intended.
You are cordially invited to join Lightspin at the Purple Cloud Summit & Lounge at the Contemporary Jewish Museum in San Francisco on June 8th during RSA.
Lightspin obtains credentials to an internal AWS service by exploiting a local file read vulnerability on the RDS EC2 instance using the log_fdw extension.
With Recon.Cloud, a public and free AWS cloud security reconnaissance tool, users can reveal publicly exposed cloud assets on any domain.
Lightspin reveals several ways an attacker could potentially access your sensitive data using Redshift COPY command.
Lightspin is giving away 25 one-year subscriptions to A Cloud Guru, a $420 value.
The fourth and final entry of the Microsoft Defender for Endpoint on AWS series by Jonathan Rau, CISO at Lightspin.
Learn all about how to accomplish automated security analysis for your IaC templates using the new Lightspin IaC Orb inside the CircleCI platform.
Get a closer look at EKS authentication every step of the way, from creating a cluster to using Kubectl to run commands on your cluster.
This blog offers answers to how the Amazon EKS Creation Engine (ECE) tool was created, use cases for it, and an explanation of some of the code pieces.
The fourth and final entry of the Microsoft Defender for Endpoint on AWS series by Jonathan Rau, CISO at Lightspin.
This blog offers answers to how the Amazon EKS Creation Engine (ECE) tool was created, use cases for it, and an explanation of some of the code ...
In our third Microsoft Defender for Endpoint (MDE) entry, we experiment with installing MDE onto Amazon Elastic Kubernetes Service (EKS) Nodes.
The second part of Lightspin's Microsoft Defender for Endpoint on AWS series by Jonathan Rau, CISO at Lightspin.
This blog serves as the first part of our series that deep dives into Microsoft Defender for Endpoint on AWS.
Leverage predictive attack path analysis and keep attackers out of your environment
The fourth and final entry of the Microsoft Defender for Endpoint on AWS series by Jonathan Rau, CISO at Lightspin.
This blog offers answers to how the Amazon EKS Creation Engine (ECE) tool was created, use cases for it, and an explanation of some of the code ...
In our third Microsoft Defender for Endpoint (MDE) entry, we experiment with installing MDE onto Amazon Elastic Kubernetes Service (EKS) Nodes.
The second part of Lightspin's Microsoft Defender for Endpoint on AWS series by Jonathan Rau, CISO at Lightspin.
This blog serves as the first part of our series that deep dives into Microsoft Defender for Endpoint on AWS.
© 2022 Lightspin