Application Security, Cloud, Cloud & Platform Security 20/March/2025 Event injection in serverless architectures This report is a study of serverless architecture and how this type of environment opens up a new range of injection attacks. This study provides an overview of the architecture, the range of its attack surface, how injection attacks occur and the possible impacts that this kind of vulnerability can bring.
Cloud 15/December/2023 The Art of Cloud Security: Proactive Detection of Configuration Errors Implementing a mechanism that detects configuration faults and makes them visible to be handled by the administrators is an excellent alternative for reducing the attack surface on Cloud resources
Cloud 15/October/2019 Cloud Migration: what to consider from a cybersecurity perspective Keeping cloud data secure requires as much or more care and control than data stored on premises
Application Security, Cloud, Cloud & Platform Security 20/March/2025 Event injection in serverless architectures This report is a study of serverless architecture and how this type of environment opens up a new range of injection attacks. This study provides an overview of the architecture, the range of its attack surface, how injection attacks occur and the possible impacts that this kind of vulnerability can bring.
Cloud 15/December/2023 The Art of Cloud Security: Proactive Detection of Configuration Errors Implementing a mechanism that detects configuration faults and makes them visible to be handled by the administrators is an excellent alternative for reducing the attack surface on Cloud resources
Cloud 15/October/2019 Cloud Migration: what to consider from a cybersecurity perspective Keeping cloud data secure requires as much or more care and control than data stored on premises