Knowledge sharing

At O3 Cyber, we're committed to advancing cloud security through knowledge sharing. Our experts contribute to the field via podcasts, technical content, and presentations. We also offer private workshops, bringing our insights directly to organizations. By pushing boundaries and challenging conventions, we aim to elevate industry-wide expertise in cloud security.

Post image
KubeCon 2025

This year we attended KubeCon + CloudNativeCon Europe 2025 event in London.

Read article ->
Post image
S05E03 - Cloud Threat Detection with Anja Olsen

In this episode of the O3 Cloud Security Podcast, Håkon Sørum and Anja Olsen delve into the intricacies of cloud threat detection, ...

View video
Post image
S05E03 - Cloud Threat Detection with Anja Olsen

In this episode of the O3 Cloud Security Podcast, Håkon Sørum and Anja Olsen delve into the intricacies of cloud threat detection, discussing its differences from traditional detection methods, the importance of application-specific knowledge, and the evolving landscape of cybersecurity. Anja shares her journey in cybersecurity, her role at DNB, and insights into effective detection strategies, including the significance of risk-based alerting and community engagement. DNB Threat Report:https://www.dnb.no/okonomisk-radgiver/sikkerhet/trusler-og-trenderDetection Engineering Weekly: https://www.detectionengineering.net/ Detection at scale: detectionatscale.com Deathcon: https://deathcon.io/ 

Listen to episode
Post image
Wiz as code: Accelerating Wiz with Terraform - part I

As organizations scale their cloud infrastructure, securing assets efficiently becomes a critical challenge.

Read article ->
Post image
Security without flashing a badge: The evolution of the modern security team

This article intends to share the personal view and experience of the author.

Read article ->
Post image
A Guide to Assessing Privileges in Google Cloud

When assessing Google Cloud environments, one of the areas that we spend the most time understanding is Identity and Access Management. This article aims to demonstrate the different ways IAM can be assessed in GCP and its pros and cons. Much of the work is about processing and correlating data from multiple sources to determine attack paths.

Read article ->