Cloud Security

Cloud Security

81 bookmarks
Custom sorting
Introducing the MCP Registry
Introducing the MCP Registry
Today, we’re launching the Model Context Protocol (MCP) Registry—an open catalog and API for publicly available MCP servers to improve discoverability and implementation. By standardizing how servers are distributed and discovered, we’re expanding their reach while making it easier for clients to get connected. The MCP Registry is now available in preview. To get started: Add your server by following our guide on Adding Servers to the MCP Registry (for server maintainers) Access server data by following our guide on Accessing MCP Registry Data (for client maintainers) Single source of truth for MCP servers In March 2025, we shared that we wanted to build a central registry for the MCP ecosystem. Today we are announcing that we’ve launched https://registry.modelcontextprotocol.io as the official MCP Registry. As part of the MCP project, the MCP Registry, as well as a parent OpenAPI specification, are open source—allowing everyone to build a compatible sub-registry.
·blog.modelcontextprotocol.io·
Introducing the MCP Registry
AWS CloudTrail cheat sheet
AWS CloudTrail cheat sheet
Incident Response in AWS made easy (easier 😉)
·invictus-ir.medium.com·
AWS CloudTrail cheat sheet
AWS EC2 IMDS - What You Need to Know - Ermetic
AWS EC2 IMDS - What You Need to Know - Ermetic
Read this technical review of IMDS, an important AWS EC2 service component, to understand the 2 versions and better secure your AWS environment
·ermetic.com·
AWS EC2 IMDS - What You Need to Know - Ermetic
Cloud storage security: What's new in the threat matrix | Microsoft Security Blog
Cloud storage security: What's new in the threat matrix | Microsoft Security Blog
We’re announcing the release of a second version of our threat matrix for storage services, a structured tool that assists in identifying and analyzing potential security threats on data stored in cloud storage services.
·microsoft.com·
Cloud storage security: What's new in the threat matrix | Microsoft Security Blog
Cloud CISO Perspectives: Early July 2023 | Google Cloud Blog
Cloud CISO Perspectives: Early July 2023 | Google Cloud Blog
Google Cloud CISO Phil Venables talks with Royal Hansen, vice president of Privacy, Safety, and Security Engineering at Google, about red teaming AI and the Aspen Security Forum.
·cloud.google.com·
Cloud CISO Perspectives: Early July 2023 | Google Cloud Blog
How to create a cyber security strategy roadmap
How to create a cyber security strategy roadmap
In a break from the usual discussions on Cloud Security and Artificial Intelligence , I thought it would be a good idea to look at…
·taimurcloud123.medium.com·
How to create a cyber security strategy roadmap
On Establishing a Cloud Security Program
On Establishing a Cloud Security Program
Some actionable advice that can be undertaken to establish a cloud security program aimed at protecting a cloud native, service provider agnostic, container-based, offering
·blog.marcolancini.it·
On Establishing a Cloud Security Program
Polar Security - 10 Best Practices for Cloud Security Posture Management
Polar Security - 10 Best Practices for Cloud Security Posture Management
10 Best Practices for Cloud Security Posture Management | As more and more organizations move to the cloud and as the technology becomes more complex, so do the threats. Protecting your cloud environment and maintaining a strong and efficient posture is essential. Here are 10 best practices to do just that.
·polar.security·
Polar Security - 10 Best Practices for Cloud Security Posture Management
A Secure Cloud
A Secure Cloud
Build secure AWS environments in minutes: automated services for building, assessing, and securing AWS environments.
·asecure.cloud·
A Secure Cloud
Building a security team for the Cloud | Personal notes on Cybersecurity and Cloud
Building a security team for the Cloud | Personal notes on Cybersecurity and Cloud
Whether you have started thinking about transitioning to the cloud, are already on your way or have been ‘there’ for a while, how involved is your security team in the transformation? As a public speaker, I only submit presentations when I have research that I am passionate about, or when I believe I can present an inspirational topic. In 2019, Suhail (arranging HackCon) specifically requested a cloud-focused session and I went right to the drawing board. I came back with my session ‘10 lessons learned from 5 years in the cloud’. Unlike my previous presentations, this session focused a lot more on the transformational challenges for security teams when it comes to adopting the cloud and, strategies for succeeding with building your security team for the cloud.
·blog.karims.cloud·
Building a security team for the Cloud | Personal notes on Cybersecurity and Cloud