Platform
Plerion Platform
Asset inventory
Misconfigurations
Vulnerabilities
Breach detection
Permissions
Data security
Infrastructure as code
Compliance
Software composition
Explore the platform →
Integrations →
Supported clouds →
Use cases →
Use cases
Find & prioritize vulnerabilities
Identify the 1% of risk that matters
Understand what's in your cloud
Know who has access to what
Work where you already work
Resources
Blog
Cloud knowledge base
Customers
Company
About
Careers
Contact
Partnerships
Home
Platform
Asset Inventory
Misconfigurations
Vulnerabilities
Permissions
Breach Detection
Data Security
Infrastructure as Code
Compliance
Software Composition
Explore The Platform
Use Cases
Find & prioritize vulnerabilities
Identify the 1% of risk that matters
Understand what's in your cloud
Know who has access to what
Work where you already work
Resources
Blog
Cloud knowledge base
Customers
Company
About us
Careers
Contact us
Trust center
Get a demo
Sign up
Sign in
Blog
Cloud security blog
Your queues, your responsibility
Sid Rajalakshmi
August 20, 2024
Things you wish you didn't need to know about S3
May 30, 2024
S3 Bucket Encryption Doesn't Work The Way You Think It Works
April 19, 2024
Please buy our gen-v workload-deep threat-led risk-driven humachine-powered hyperscale cloud security solution
April 3, 2024
Hacking Terraform State for Privilege Escalation
February 28, 2024
Tapping the Leaking AWS Account ID Faucet
February 15, 2024
Conditional Love for AWS Metadata Enumeration
February 7, 2024
The Final Answer: AWS Account IDs Are Secrets
January 17, 2024
How to give direction to an engineering-led startup without a chief product officer
December 20, 2023
Plerion becomes first Australian headquartered software company to achieve AWS Security Competency status
December 13, 2023
The Deputy Is Confused About AWS Security Hub
November 3, 2023
Fueling Innovation: Plerion Secures $10M in Seed Funding for Cloud Security Transformation
September 25, 2023