Why We Started ARGOS – Cloud Security FOR Consultants
Today, we wanted to give you a little history lesson into why we started ARGOS. What lead us to build this Cloud Security SaaS in a time where there seemingly already are so many others around? /*! elementor - v3.9.2 -
How to protect SaaS with Strong Azure MFA Authentication
Often customers ask us how they can protect the information stored within ARGOS from individuals that should not have access to it. Attackers regularly gain access to administrators' identities and attempt to understand what those identities might have access to. This
How to make sense of CSPM, CAASM, CIEM, CNAPP
Did you come here because you typed "What is CSPM" or "Do I need a CIEM?" into the search engine? Maybe even "Do I really need 20 different security products?". You're not alone. These are questions we have been hearing from
How To Secure an AWS IAM Role by IP Address
Amazon Web Services (AWS) Identity and Access Management (IAM) is one of the things that is often, let's say, overly complicated, but it is paramount to get it right. Incorrectly applied or overly permissive IAM policies and roles are often
How to Secure an Azure Service Principal with Conditional Access
Identity and Access Management (IAM) is absolutely fundamental to a Cloud operation, however, sometimes you had to make allowances for certain scenarios. For example, in order to gain access to a Microsoft Azure environment the most common way for Software
How to Integrate with Microsoft Sentinel SIEM
Cloud teams tell us they want to be able to see security issues in their environment in a central location. Going from one proprietary dashboard to another with several context switches, different query languages and only limited views of the
Cloud Security Report 2021
We are coming to the end of 2021, and it is a good time to look at the state of cloud security. Several events this year have again highlighted the importance for an increased focus on one’s cloud security posture.An
How to Detect Potentially Dangerous Dangling DNS on AWS
Dangling DNS records are a real security issue and without going into too much detail as to why this is, here is a quick overview of what "dangling DNS" means in the context of AWS. If you do want to know
How to Monitor for Secrets in AWS Lambda
AWS Lambda Functions have been, are and will be a major part of most AWS implementations. They are super handy, quick to develop, can be really cheap and generally just does what it needs to do. In general it is considered
How To Monitor For Risky Public Azure Virtual Machines
Public Azure Virtual Machines are one of the most exploited resources in the Azure cloud. As we mentioned in our recent white paper (here) it only takes a few seconds on average for someone to test your Virtual Machine for