Transitioning from On-Premise Storage to AWS Cloud: A Strategic Guide for Companies

May 30, 2024 | Thomas Jung

Cloud forensics - An introduction to investigating security incidents in AWS, Azure and GCP

April 13, 2023 | Chris Doman

The content of this post is solely the responsibility of the author. LevelBlue ...

Working with AWS to secure your data against attack

January 24, 2023 | Karoline Gore

The content of this post is solely the responsibility of the author. LevelBlue ...

Improve your AWS security posture, Step 2: Avoid direct internet access to AWS resources

January 11, 2023 | Chris Maes

In the first blog in this series, we discussed setting up IAM properly. Now ...

Three easy steps to dramatically improve your AWS security posture: Step 1, set up IAM properly

January 04, 2023 | Chris Maes

Have you ever heard the saying that the greatest benefit of the cloud is that ...

Data Exfiltration in AWS: Part 2 of Series

January 07, 2019 | Tom D'Aquino

In the previous blog in this four-part blog series, we discussed AWS IAM and ...

AlienVault Delivers Phenomenal Cloud Security for AWS Customers

November 26, 2018 | Julia Kisielius

Viva Las Vegas! We aliens have landed at AWS re:Invent 2018 (Booth #1506), ...

Starwood Waypoint and CeloPay Use AlienVault USM Anywhere to Secure Their AWS Cloud Environments

August 10, 2017 | John Maguire

Amidst today’s rapidly changing threat landscape, companies must work ...

Starwood Waypoint and CeloPay Use AlienVault USM Anywhere to Secure Their AWS Cloud Environments

August 10, 2017 | John Maguire

Amidst today’s rapidly changing threat landscape, companies must work ...

Configuring Kali Linux on Amazon AWS Cloud for FREE

June 07, 2017 | Irfan Shakeel

Kali Linux is the most desired pentesting distribution. There are number of ...

11 Simple Yet Important Tips to Secure AWS

March 09, 2017 | Jaime Blasco

This is the first in a series of blogs dedicated to Amazon Web Services (AWS) ...