Click any tag below to further narrow down your results
Links
This article examines how attackers can exploit log data in cloud environments for enumeration and intelligence gathering. It discusses the types of logs generated by major cloud providers like AWS, Azure, and GCP, and highlights the importance of rethinking log access to enhance security. Practical mitigation strategies for defenders are also presented.
This article outlines the creation of a unified dashboard for tracking costs across multiple cloud platforms, including AWS and GCP. It details the implementation steps using tools like dlt, SQL, and Rill to visualize data and combines cloud costs with revenue metrics for better financial insights.
The article analyzes the long-term costs of storing 10 petabytes of cold data using AWS, GCP, Azure, and tape over 20 years. It highlights the financial implications and efficiency of each option, providing insights for organizations considering their data storage strategies.