Blog
IaC Security Review
Sherlocked Security – IaC Security Review (Terraform, CloudFormation) Comprehensive Static...
Policy-Driven Gate Enforcement
Sherlocked Security – Policy-Driven Gate Enforcement Enforce Security, Compliance, and...
Secrets Management (Vault, KMS)
Sherlocked Security – Secrets Management (Vault, KMS) Secure Design, Review,...
Security as Code (OPA, Rego)
Sherlocked Security – Security as Code (OPA, Rego) Automating Security...
Shift-Left Training & Workshops
Sherlocked Security – Shift-Left Training & Workshops Embed Secure Development...
Adversary Simulation (MITRE ATT&CK)
Sherlocked Security – Adversary Simulation (MITRE ATT&CK) Simulate Real-World Adversaries...
Campaign-Based Red Team Operations
Sherlocked Security – Campaign-Based Red Team Operations Test and Strengthen...
Command & Control (C2) Emulation
Sherlocked Security – Command & Control (C2) Emulation Simulate Advanced...
Credential Harvesting Simulation
Sherlocked Security – Credential Harvesting Simulation Simulate Phishing and Credential...
Emotet-Containment Campaign Simulation
Sherlocked Security – Emotet/Containment Campaign Simulation Simulate a Real-World Emotet...