Identity and Access Management (IAM) is absolutely fundamental to a Cloud operation, however, sometimes you had to make allowances for…

Identity and Access Management (IAM) is absolutely fundamental to a Cloud operation, however, sometimes you had to make allowances for…
Cloud teams tell us they want to be able to see security issues in their environment in a central location.…
We are coming to the end of 2021, and it is a good time to look at the state of…
Dangling DNS records are a real security issue and without going into too much detail as to why this is,…
AWS Lambda Functions have been, are and will be a major part of most AWS implementations. They are super handy,…
Public Azure Virtual Machines are one of the most exploited resources in the Azure cloud. As we mentioned in our…
One of probably the most commonly referred to services in breaches / data leaks is Amazon AWS’s storage service S3.…
Just recently Wiz released an announcement into a very critical vulnerability in one of Microsoft Azure’s flagship services, Azure Cosmos DB. Because these…
Why is Cloud Security such a big challenge?
Many organisations seem to struggle with insecure cloud environments even though their Cloud Providers (Microsoft Azure, Amazon AWS, Google GCP) provide them with all the tools they need to create secure platforms.
ARGOS has deep insights into our customers’ cloud environments across the three major public clouds providers. There are a handful of common recurring themes when it comes to cloud misconfigurations.