MCP Server Security: Navigating the New AI Attack Surface Just as the rise of cloud computing forced a rethink of perimeter-based security, the adoption of large language models (LLMs) [...]
GitHub Actions on AWS: How to Implement Identity Federation Configuring OIDC for GitHub Actions on AWS GitHub Actions offers a feature that allows workflows to generate signed OpenID Connect [...]
Assured Workloads in Google Cloud Platform What is Google Cloud Platform’s Assured Workloads? Google Cloud Platform’s (GCP) Assured Workloads provides a way for control packages to [...]
Understanding AWS Service Control Policies Access management within your cloud environment can be one of the most demanding challenges within AWS, with the constant addition [...]
A Layperson’s Guide to GCP Network Firewalling A companion to OSI Layer 3/Layer 4 firewalling in GCP Firewalls have been, and continue to be, an evergreen technical [...]
The New Era of CISO Influence: How Technology Leaders Can Guide Organizations Through Rapid Change In today’s era of rapid technological change, CISOs hold a unique and expanding position of influence. Emerging technologies—especially AI and [...]
Unlocking DoD Contracts Through CMMC Compliance What is the Cybersecurity Maturity Model Certification (CMMC) and Why is it Important for DoD Partners? The Cybersecurity Maturity Model [...]
AWS re:Invent 2025: A Deep Dive into Proactive Security and Governance AWS re:Invent 2025 Expert Insights It was exciting to be back in Las Vegas for AWS re:Invent 2025. This year, [...]