The CIS benchmarks for Azure are a comprehensive collection of security best practices for the platform. In this guide, we'll explain how to use the benchmarks report to check these controls in your Azure account.
If you have public AMIs in your AWS account, they might be exposing sensitive information about your applications. In this guide, we'll show you how to find and update public AMIs to private.
Suspicious events in Okta could be harmless false alerts or early indicators of a malicious attack. In this guide, we'll explain a bit about the types of suspicious events and show how security teams can respond to them.
If you encounter computing issues in a certain area, it's helpful to have backup instances ready. In this guide, we'll show you how to prepare by copying Azure VM instances from one region to another.
If one of your employees has their account compromised, being able to quickly see their GCP user activity can help you assess the threat. In this guide, we'll show you how to quickly get a user's activity logs from GCP.
When malware is detected on a device, you can contain that endpoint with CrowdStrike to reduce your risk. In this guide, we'll show you how to take these containment steps.
If malware is detected on one device at your organization, it might not be the only one. In this guide, we'll show you how to search whether any other devices have encountered the same IOCs.
Cleaning up inactive sensors in CrowdStrike ensures that you aren't paying for resources you are not using. In this guide, we'll show you how to identify and clean up inactive sensors.
When dealing with a security incident, getting relevant activity logs can help your team understand the scope of the threat. In this guide, we'll show you how to get the activity logs for a given user in Azure.
If you are dealing with a security event, you may want to block a user or group's access to a GCP project. In this guide, we'll show you how to block access using the GCP Console and CLI.
Cloud native, Decentralized, and Secure.Start transforming your cloud and security operations with Blink.