cloud

Cloud Security

Discussion about Kim's new book on Cloud Security, some of the content, and links to other useful resources around securing your Cloud environments.

Cloud Security - Quick Reference

Are you looking to achieve a good understanding of your responsibilities as well as your CSPs responsibilities to make sure your security stature in the Cloud is where you need it to be? Do you need the technical direction required to create your secure Cloud environment? You can think of this book as your technical Cloud consultant.

Péter Budai on End to End Encryption

Head of Cryptography Engineering at Tresorit, Péter Budai talks with Kim Carter about End to End Encryption.

Workshop - Building Security Into Your Development Teams

Kim's flagship Software Developer focussed training, this time at OWASP New Zealand Day conference.

Scott Piper on Cloud Security

Founder of Summit Route / creator of FLAWS, Scott Piper talks with Kim Carter about Cloud Security on Software Engineering Radio.

Building Security into Your Development Teams (workshop) $495 + GST per student

Full Day Interactive Workshop focussing on building security into your Development Team(s).

Holistic Info-Sec for Web Developers

A three part book series focused on lifting the security knowledge of Software Developers, Engineers, and their teams, so that they can continuously deliver secure technical solutions on time and within budget, without nasty surprises. First book is complete, second book is content complete and currently in technical review.

Workshop - Building Security Into Your Development Teams

Kim's flagship Software Developer focussed training, this time at Christchurch Hacker Conference (CHCon).

The Cloud Shared Responsibility Model

The shared responsibility model is one that many have not grasped or understood well. Let’s look at the responsibilities of the parties.

Workshop - Holistic Info-Sec for Web Developers - Intense

Kiwicon hands-on threat modelling, attack and defence strategy training for Web Developers wishing to understand their attackers better, stay ahead of them and create cost effective defence strategies.