Paul Schwarzenberger (@paulschwarzen) 's Twitter Profile
Paul Schwarzenberger

@paulschwarzen

Cloud Security Architect and DevSecOps

ID: 1045982795003297793

calendar_today29-09-2018 10:25:06

170 Tweet

624 Followers

141 Following

Paul Schwarzenberger (@paulschwarzen) 's Twitter Profile Photo

Thanks jessica Glenn Wilson (DevSecOps) 🇺🇦 Steve Giguere Francesca 🙌 for inviting me to present “Road to IAM Zero” at DevSecOps London Gathering on Wednesday 25th October at Investigo - I look forward to seeing you there 😀 Sign up at meetup.com/devsecops-lond…

Thanks <a href="/JessicaCregg/">jessica</a>  <a href="/GlennDynaminet/">Glenn Wilson (DevSecOps) 🇺🇦</a>  <a href="/_SteveGiguere_/">Steve Giguere</a>  Francesca 🙌 for inviting me to present “Road to IAM Zero” at  <a href="/DevSecOpsLG/">DevSecOps London Gathering</a>  on Wednesday 25th October at <a href="/InvestigoLtd/">Investigo</a> - I look forward to seeing you there 😀 
Sign up at meetup.com/devsecops-lond…
Paul Schwarzenberger (@paulschwarzen) 's Twitter Profile Photo

Good to see Sam Stepanyan as a candidate for the OWASP® Foundation 2023 Global Board of Directors election 🎉 Sam has done an amazing job for many years leading OWASP London, OWASP Project Nettacker, organising and speaking at OWASP conferences and events 🚀

Good to see <a href="/securestep9/">Sam Stepanyan</a> as a candidate for the <a href="/owasp/">OWASP® Foundation</a>  2023 Global Board of Directors election 🎉

Sam has done an amazing job for many years leading <a href="/OWASPLondon/">OWASP London</a>, OWASP Project Nettacker, organising and speaking at OWASP conferences and events 🚀
Paul Schwarzenberger (@paulschwarzen) 's Twitter Profile Photo

Many thanks to Vandana Verma 🙏 for inviting me to speak about OWASP Domain Protect on your OWASP® Foundation Spotlight series 🙂 Sam Stepanyan appreciate you introducing us and making the suggestion 🚀 youtube.com/watch?v=KoP1X1…

Paul Schwarzenberger (@paulschwarzen) 's Twitter Profile Photo

Looking forward to presenting "Road to IAM Zero" at DevSecOps London Gathering on 25 October 🙂 5 steps to eliminate insecure IAM users from your Amazon Web Services org 🎉 world first public live demo of a new AWS Identity service feature 🚀 signup: meetup.com/devsecops-lond…

Looking forward to presenting "Road to IAM Zero" at <a href="/DevSecOpsLG/">DevSecOps London Gathering</a> on 25 October 🙂 5 steps to eliminate insecure IAM users from your <a href="/awscloud/">Amazon Web Services</a> org 🎉 world first public live demo of a new <a href="/AWSIdentity/">AWS Identity</a> service feature 🚀 signup: meetup.com/devsecops-lond…
Paul Schwarzenberger (@paulschwarzen) 's Twitter Profile Photo

Looking forward to seeing you tomorrow at Investigo for DevSecOps London Gathering 😊 5 steps to eliminate IAM users from your #AWS organisation 🚀 live demo of new IAM feature 🌟 sign-up: meetup.com/devsecops-lond…

Looking forward to seeing you tomorrow at <a href="/InvestigoLtd/">Investigo</a> for <a href="/DevSecOpsLG/">DevSecOps London Gathering</a> 😊 5 steps to eliminate IAM users from your #AWS organisation 🚀 live demo of new IAM feature 🌟 sign-up: meetup.com/devsecops-lond…
Paul Schwarzenberger (@paulschwarzen) 's Twitter Profile Photo

🚀New open-source cloud CA on #AWS costs $50 per year instead of $10,000 using AWS Private CA. Thanks Dhruv AHUJA for your review and contribution 🙂 Docs at serverlessca.com

🚀New open-source cloud CA on #AWS costs $50 per year instead of $10,000 using AWS Private CA. Thanks <a href="/new23d/">Dhruv AHUJA</a> for your review and contribution 🙂 Docs at serverlessca.com
Paul Schwarzenberger (@paulschwarzen) 's Twitter Profile Photo

New blog post on configuring #AWS Application Load Balancer with certificate authentication using our open-source cloud CA: medium.com/@paulschwarzen…

New blog post on configuring #AWS Application Load Balancer with certificate authentication using our open-source cloud CA:
medium.com/@paulschwarzen…
AWS Security Digest (@awssecdigest) 's Twitter Profile Photo

🛎️ AWS Security Digest 164 is ready! 1️⃣ Rami McCarthy on exposed SSM documents 2️⃣ Paul Schwarzenberger with a AWS IAM Roles Anywhere tutorial 3️⃣ Palo Alto Networks exploring cloud VM attack paths awssecuritydigest.com/past-issues/aw…

Paul Schwarzenberger (@paulschwarzen) 's Twitter Profile Photo

How we secured APIs 🔒 cost effectively with certificates 🔑 using our open-source private CA 🚀 medium.com/@paulschwarzen…

How we secured APIs 🔒 cost effectively with certificates 🔑 using our open-source private CA 🚀
medium.com/@paulschwarzen…
SANS Cloud Security (@sanscloudsec) 's Twitter Profile Photo

Join us at the SANS #CloudSecNextSummit where Paul Schwarzenberger will unveil an exciting open-source project! Stay tuned for an interactive, live demonstration of the CA and mTLS use case. Secure Your Spot and Register Today: sans.org/u/1uDe

Join us at the SANS #CloudSecNextSummit where <a href="/paulschwarzen/">Paul Schwarzenberger</a> will unveil an exciting open-source project! Stay tuned for an interactive, live demonstration of the CA and mTLS use case.

Secure Your Spot and Register Today: sans.org/u/1uDe
SANS Cloud Security (@sanscloudsec) 's Twitter Profile Photo

Starting Now on Track 2 at #CloudSecNextSummit | Paul Schwarzenberger is discussing an open-source serverless #cloud Certificate Authority. Join us to learn how to implement a secure, cost-effective CA for your systems. ➡️ Register Free & Join: sans.org/u/1uDe #CloudSecurity

Starting Now on Track 2 at #CloudSecNextSummit | <a href="/paulschwarzen/">Paul Schwarzenberger</a> is discussing an open-source serverless #cloud Certificate Authority. Join us to learn how to implement a secure, cost-effective CA for your systems.

➡️ Register Free &amp; Join: sans.org/u/1uDe

#CloudSecurity
Paul Schwarzenberger (@paulschwarzen) 's Twitter Profile Photo

How a student on my cloud security training course ended up accessing underlying AWS infrastructure 😮 Thanks Aidan W Steele your post on CloudShell helped me understand what was going on 🚀link.medium.com/aTetDu8SINb

How a student on my cloud security training course ended up accessing underlying AWS infrastructure 😮

Thanks <a href="/__steele/">Aidan W Steele</a>  your post on CloudShell helped me understand what was going on 🚀link.medium.com/aTetDu8SINb