Applying Cyber Essentials scheme to CI/CD
The Cyber Essentials scheme provides simple and clear guidance but how does it apply to cicd?
The Cyber Essentials scheme provides simple and clear guidance but how does it apply to cicd?
Attackers typically use stolen AWS Access keys to deploy expensive cryptomining ec2 instances, but this can be be blocked with SCPs.
Simon delivered his subdomain hijacking talk with a new twist. Why is DevOps making us more vulnerable?
With so many of our talks taking us to Manchester and London, Simon jumped at the chance for a local talk in Newcastle!
Find out how we use Terraform to manage our GitHub organisation, control users and teams and create repositories.
Punk Security is officially 1 year old!
We had a Q&A session with our very own Daniel Oates-Lee to discuss the journey so far and what’s next for Punk Security.