Applying Cyber Essentials scheme to CI/CD
The Cyber Essentials scheme provides simple and clear guidance but how does it apply to cicd?
The Cyber Essentials scheme provides simple and clear guidance but how does it apply to cicd?
Attackers typically use stolen AWS Access keys to deploy expensive cryptomining ec2 instances, but this can be be blocked with SCPs.
Simon delivered his subdomain hijacking talk with a new twist. Why is DevOps making us more vulnerable?
With so many of our talks taking us to Manchester and London, Simon jumped at the chance for a local talk in Newcastle!
Punk Security is officially 1 year old!
We had a Q&A session with our very own Daniel Oates-Lee to discuss the journey so far and what’s next for Punk Security.
We exhibited for the first time, choosing Manchester DTX as our first ever trade event.
Daniel also spoke on the DevOps stage, giving a fantastic talk on DevSecOps