The Benefit of Tagging

Most vendors or services nowadays offer some form of tagging. To name a few: Azure, AWS, Google Cloud, Qualys, CrowdStrike. The feature itself is pretty straight forward, however if dynamic criteria can be applied or automation, it makes life that much easier.

For most, the automation piece may come from utilizing the API calls. This doesn’t have to nessesaryly be a continuous script or API call but instead a one off…

--

--

--

I help build automation …. 🚀 https://securethelogs.carrd.co/

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Admin Panel Accessed Via SQL Injection… (Ezy Boooom…😅)

Certified cybersecurity Professional

Cryptojacking Malware Gets Creative with Variable Names

{UPDATE} Best Fiends Forever Hack Free Resources Generator

{UPDATE} Pony Girls Horse Care Resort Hack Free Resources Generator

{UPDATE} 12 Etiquetas de Navidad - 12 Taps of Christmas Like A Christmas Food Fever Cooking, A…

VeriDoc Global & InfoConnect Partnership

Ethical Hacking (part 5.3/20): Spectre and Meltdown Vulnerability explained

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Xstag0

Xstag0

I help build automation …. 🚀 https://securethelogs.carrd.co/

More from Medium

How to Avoid Brute Force Attack on Windows server | Some methods to Prevent Brute Force Attack!

Don’t take it out on the Incident Response Team

Living Off The Land: Suspicious System32

CWE vs CVE