blog
Applications running in EKS often require access to AWS resources, including S3 buckets, DynamoDB tables,...
Eric Johnson / 29 Feb 2024
RSA 2023 (Stronger Together), wrapped up in San Francisco last week. On Monday, I presented...
Eric Johnson / 01 May 2023
Puma Security hosted the 2022 Hackers Teaching Hackers (HTH) Cloud Security Village.
Eric Johnson / 03 Nov 2022
RSA 2020 (The Human Element), wrapped up in San Francisco last week. Our cloud security...
Eric Johnson / 02 Mar 2020
Join Eric Johnson and Jason Wood as they discuss how to build a career in...
Eric Johnson / 03 Feb 2020
Are you looking for an open source project to contribute to? Are you interested in...
Eric Mead / 29 Jan 2020
With the Capital One breach announced in July 2019, weaknesses in the Amazon Web Services’...
Eric Johnson / 09 Oct 2019
Eric Johnson / 06 Apr 2019
DevOps is redefining the way organizations handle software development. But it’s also challenging security professionals...
David Bisson / 02 Oct 2018
State of DevOps report indicates high performing organizations are deploying 46 times more frequently, but...
Eric Johnson / 31 Jul 2018
Eric Johnson, Principal Security Engineer, weighs in on where to start adding security into DevSecOps...
/ 17 Jul 2018
SecDevOps is all about breaking down walls between security and development, operations, and business. Take...
Eric Johnson / 10 Jun 2018
I work in a development shop where we rely on Continuous Integration (CI) and Continuous...
Mitch Ostlund / 16 Nov 2017
What is a Puma Scan? How is it different than other static scanners? A beginners...
Brooke Johnson / 10 Nov 2017