How to Integrate with Microsoft Sentinel SIEM
Cloud teams tell us they want to be able to see security issues in their environment in a central location. Going from one proprietary dashboard to another with several context switches, different query languages and only limited views of the
How to Detect Potentially Dangerous Dangling DNS on AWS
Dangling DNS records are a real security issue and without going into too much detail as to why this is, here is a quick overview of what "dangling DNS" means in the context of AWS. If you do want to know
How to Monitor for Secrets in AWS Lambda
AWS Lambda Functions have been, are and will be a major part of most AWS implementations. They are super handy, quick to develop, can be really cheap and generally just does what it needs to do. In general it is considered
How To Monitor For Risky Public Azure Virtual Machines
Public Azure Virtual Machines are one of the most exploited resources in the Azure cloud. As we mentioned in our recent white paper (here) it only takes a few seconds on average for someone to test your Virtual Machine for
How to find those stupid & annoying public AWS S3 Buckets
One of probably the most commonly referred to services in breaches / data leaks is Amazon AWS's storage service S3. Why? Because it is easy to misconfigure it. We even mentioned it as one of the most common misconfigurations in
Most Common Cloud Misconfigurations 2021 – Not What You Might Have Thought
ARGOS has deep insights into our customers' cloud environments across the three major public clouds providers. There are a handful of common recurring themes when it comes to cloud misconfigurations.
Cloud Security – a Shared Responsibility
Why is Cloud Security such a big challenge? Many organisations seem to struggle with insecure cloud environments even though their Cloud Providers (Microsoft Azure, Amazon AWS, Google GCP) provide them with all the tools they need to create secure platforms.