Blog Archives
RSS feed- Lightsail object storage concerns - Part 2 2022.03.17
- Lightsail object storage concerns - Part 1 2021.08.05
- S3 backups and other strategies for ensuring data durability through ransomware attacks 2021.08.03
- AWS security project ideas 2021.02.16
- AWS Security Maturity Roadmap 2021 2021.01.12
- Opting out of AWS AI data usage 2021.01.06
- Setting up personal G Suite backups on AWS 2020.11.24
- The state of ABAC on AWS 2020.11.02
- Public dataset of Cloudtrail logs from flaws.cloud 2020.10.09
- Denial of Wallet Attacks on AWS 2020.06.08
- Client Side Monitoring 2020.05.25
- AWS Security Maturity Roadmap 2020 2020.05.21
- Delegated admin with GuardDuty and Access Analyzer 2020.05.04
- Isolated networks on AWS 2020.03.31
- AWS Phishing Emails 2020.03.30
- AWS SCP Best Practices 2020.03.25
- re:Invent 2019 Security Review 2019.12.20
- re:Inforce Recap 2019.07.01
- AWS IAM Managed Policy Review 2019.06.18
- AWS Security Maturity Roadmap 2019.04.10
- Advanced AWS policy auditing - Confused deputies with AWS services 2019.04.03
- How to audit AWS IAM and resource policies 2019.03.26
- CloudMapper audit findings in report 2019.03.19
- CloudMapper iam_report command 2019.03.11
- GuardDuty Event Collection via CloudWatch Events 2019.03.06
- Should you use GuardDuty? 2019.03.05
- CloudMapper report generation 2019.03.04
- AWS resource naming patterns 2019.02.10
- Should you use AWS Config? 2019.02.06
- Lateral movement between AWS accounts - Abusing trust relationships 2019.02.04
- flAWS 2 2018.12.07
- re:Invent 2018 Security Review 2018.12.02
- Investigating malicious AMIs 2018.09.24
- CloudMapper stats chart 2018.09.20
- AWS CloudTrail vs CloudWatch Events vs Event History 2018.08.07
- AWS Security Pillar Whitepaper updates 2018.07.31
- Athena support in CloudTracker 2018.07.13
- AWS Managed Policies are an anti-pattern 2018.07.02
- AWS IAM vs API vs CloudTrail 2018.06.28
- Guidance on deploying honey tokens 2018.06.22
- Managing AWS root passwords and MFA 2018.06.20
- AWS security credential formats 2018.06.20
- How to inventory AWS accounts 2018.06.18
- CloudMapper "wot" - Command to identify a Web Of Trust of trusted AWS accounts 2018.06.13
- CloudMapper "public" - Command to identify public hosts and ports 2018.06.13
- CloudMapper "find_admins" - Command to identify admin users and roles in an account 2018.06.12
- CloudMapper "sg_ips" - Command to get geoip info on CIDRs trusted in Security Groups 2018.06.12
- CloudMapper "stats" - Command to count AWS resources 2018.06.06
- CloudMapper "collect" - Command to inventory your AWS metadata 2018.06.05
- re:Invent 2017 security review 2017.12.03
- Downclimb 2017.11.25
- Downclimb 2017.11.19
- Downclimb 2017.11.12
- Downclimb 2017.11.05
- Downclimb 2017.10.29
- Downclimb 2017.10.22
- Downclimb 2017.10.15
- Downclimb 2017.10.08
- Downclimb 2017.10.01
- Downclimb 2017.09.24
- Downclimb 2017.09.17
- Downclimb 2017.09.10
- 3 year anniversary of Downclimb 2017.09.05
- Downclimb 2017.09.03
- Downclimb 2017.08.27
- Downclimb 2017.08.20
- Downclimb 2017.08.13
- Defensive options when using AWS IAM roles 2017.08.13
- Downclimb 2017.08.06
- Downclimb 2017.07.30
- YARA sigs for security best practices 2017.07.24
- Downclimb 2017.07.23
- Downclimb 2017.07.16
- Downclimb 2017.07.09
- Downclimb 2017.07.02
- Downclimb 2017.06.10
- Downclimb 2017.06.04
- Free tools for auditing the security of an AWS account 2017.05.30
- Downclimb 2017.05.28
- Downclimb 2017.05.21
- Downclimb 2017.05.14
- Downclimb 2017.05.07
- Downclimb 2017.04.30
- Downclimb 2017.04.23
- Downclimb 2017.04.16
- Downclimb 2017.04.09
- Downclimb 2017.04.02
- Downclimb 2017.03.26
- Downclimb 2017.03.19
- Downclimb 2017.03.12
- Downclimb 2017.03.05
- flAWS challenge 2017.02.26
- Downclimb 2017.02.26
- Downclimb 2017.02.19
- Downclimb 2017.02.12
- Downclimb 2017.02.05
- Using AWS for backups 2017.01.29
- Downclimb 2017.01.29
- Downclimb 2017.01.22
- Downclimb 2017.01.15
- Downclimb 2017.01.08
- Infosec news summaries 2017.01.07
- Downclimb 2017.01.01
- Catching attackers with go-audit and a logging pipeline 2016.12.25
- Downclimb 2016.12.25
- Using Google for backups 2016.12.25
- Creating Disaster Recovery backups 2016.12.25
- Introducing Serene 2016.12.22
- Downclimb 2016.12.18
- Downclimb 2016.12.11
- Downclimb 2016.12.04
- Downclimb 2016.11.27
- How to write security alerts 2016.11.22
- Downclimb 2016.11.20
- Downclimb 2016.11.13
- Downclimb 2016.11.06
- Downclimb 2016.10.30
- Downclimb 2016.10.23
- Downclimb 2016.10.16
- Downclimb 2016.10.09
- VB2016 2016.10.09
- Downclimb 2016.10.02
- Downclimb 2016.09.25
- Downclimb 2016.09.18
- Downclimb 2016.09.11
- Downclimb 2016.09.04
- Downclimb 2016.08.28
- Downclimb 2016.08.21
- Downclimb 2016.08.14
- Downclimb 2016.08.07
- Downclimb 2016.07.31
- Downclimb 2016.06.12
- Downclimb 2016.06.05
- Downclimb 2016.05.29
- Downclimb 2016.05.22
- Downclimb 2016.05.15
- Downclimb 2016.05.08
- Downclimb 2016.05.01
- Downclimb 2016.04.24
- Downclimb 2016.04.17
- Summit Route End Point Protection (SREPP) code dump 2016.04.10
- Downclimb 2016.04.10
- Downclimb 2016.04.03
- Downclimb 2016.03.27
- Downclimb 2016.03.20
- Downclimb 2016.03.13
- Downclimb 2016.03.06
- Downclimb 2016.02.28
- Downclimb 2016.02.21
- Downclimb 2016.02.14
- Downclimb 2016.02.07
- Downclimb 2016.01.31
- Downclimb 2016.01.24
- The Great Graph 2016.01.20
- Downclimb 2016.01.17
- Downclimb 2016.01.10
- Downclimb 2016.01.03
- Setting up fREedom and BinNavi 2015.12.31
- osxlockdown 2015.12.29
- Downclimb 2015.12.27
- "Instagram's Million Dollar Bug": Case study for defense 2015.12.24
- Downclimb 2015.12.20
- Agent lessons: Hostile Territory 2015.12.17
- Agent lessons: Introduction 2015.12.15
- Downclimb 2015.12.13
- Predictions for 2016 2015.12.08
- Downclimb 2015.12.06
- Downclimb 2015.11.29
- Why did TalkTalk's stock drop when it was hacked? 2015.11.24
- Downclimb 2015.11.22
- Downclimb 2015.11.15
- Downclimb 2015.11.08
- Downclimb 2015.11.01
- Downclimb 2015.10.25
- Downclimb 2015.10.18
- Downclimb 2015.10.11
- Downclimb 2015.10.04
- Downclimb 2015.09.27
- Downclimb 2015.09.20
- One Year of Downclimb 2015.09.16
- Downclimb 2015.09.13
- Downclimb 2015.09.06
- Downclimb 2015.08.30
- Downclimb 2015.08.23
- Downclimb 2015.08.16
- Downclimb 2015.08.09
- Downclimb 2015.08.02
- Downclimb 2015.07.26
- Downclimb 2015.07.19
- Downclimb 2015.07.12
- Downclimb 2015.07.05
- Downclimb 2015.06.28
- Downclimb 2015.06.21
- Shipping Windows Events to Heka and ElasticSearch 2015.06.14
- Downclimb 2015.06.14
- Iterative Defense Architecture 2015.06.13
- Iterative Defense and The Intruder's Dilemma 2015.06.11
- The Coventry Conundrum of Threat Intelligence 2015.06.10
- Downclimb 2015.06.07
- Downclimb 2015.05.31
- Downclimb 2015.05.24
- Downclimb 2015.05.17
- Downclimb 2015.05.10
- Downclimb 2015.05.03
- Downclimb 2015.04.26
- Downclimb 2015.04.19
- Downclimb 2015.04.12
- Downclimb 2015.04.05
- Downclimb 2015.03.29
- Downclimb 2015.03.22
- Downclimb 2015.03.15
- Downclimb 2015.03.08
- Downclimb 2015.03.01
- Downclimb 2015.02.22
- Downclimb 2015.02.13
- Downclimb 2015.02.06
- Downclimb 2015.01.30
- Downclimb 2015.01.22
- Downclimb 2015.01.16
- Predictions for 2015 2015.01.14
- Downclimb 2015.01.09
- Downclimb 2015.01.02
- Downclimb 2014.12.26
- Downclimb 2014.12.19
- Downclimb 2014.12.12
- Downclimb 2014.12.05
- Downclimb 2014.11.28
- Downclimb 2014.11.21
- Downclimb 2014.11.14
- Downclimb 2014.11.07
- Downclimb 2014.10.31
- Downclimb 2014.10.24
- Modifying code-signed files 2014.10.20
- Downclimb 2014.10.17
- Downclimb 2014.10.10
- Downclimb 2014.10.03
- Downclimb 2014.09.26
- Downclimb 2014.09.19
- Downclimb 2014.09.12
- Downclimb 2014.09.05