ProtectYourIT
  • Home
  • About
  • Pages
    Authors
  • Contact
  • 🇫🇷 FR

Recent content

The foundations of a secure agentic architecture
03 Nov 2025

The foundations of a secure agentic architecture

How to secure the new generation of EUD
29 Oct 2025

How to secure the new generation of EUD

AI browsers, a risky innovation
23 Oct 2025

AI browsers, a risky innovation

SAAS security starts with you
23 Oct 2025

SAAS security starts with you

Popular topics

CSA Framework Responsability Model SAAS SSPM agentAI agentic agenticAI ai architecture aws beginner browser cloud crypto cybersecurity data genai guardrail iam innovation introduction keys kms landingzone mcp multi-cloud report security strategy vibe coding
Csa

CSA

1 Posts
SAAS security starts with you
Cédric Thibault
Responsability Model SAAS SSPM Framework CSA

SAAS security starts with you

SaaS cyberattacks are exploding due to a lack of adequate client configuration; frameworks like CSA SSCF and SSPM tools are becoming indispensable.

Framework

Framework

1 Posts
SAAS security starts with you
Cédric Thibault
Responsability Model SAAS SSPM Framework CSA

SAAS security starts with you

SaaS cyberattacks are exploding due to a lack of adequate client configuration; frameworks like CSA SSCF and SSPM tools are becoming indispensable.

Responsability model

Responsability Model

1 Posts
SAAS security starts with you
Cédric Thibault
Responsability Model SAAS SSPM Framework CSA

SAAS security starts with you

SaaS cyberattacks are exploding due to a lack of adequate client configuration; frameworks like CSA SSCF and SSPM tools are becoming indispensable.

Saas

SAAS

1 Posts
SAAS security starts with you
Cédric Thibault
Responsability Model SAAS SSPM Framework CSA

SAAS security starts with you

SaaS cyberattacks are exploding due to a lack of adequate client configuration; frameworks like CSA SSCF and SSPM tools are becoming indispensable.

Sspm

SSPM

1 Posts
SAAS security starts with you
Cédric Thibault
Responsability Model SAAS SSPM Framework CSA

SAAS security starts with you

SaaS cyberattacks are exploding due to a lack of adequate client configuration; frameworks like CSA SSCF and SSPM tools are becoming indispensable.

Agentai

agentAI

1 Posts
The Right Strategies for Implementing AI Agents
Cédric Thibault
agentAI agenticAI cloud strategy

The Right Strategies for Implementing AI Agents

The internet is buzzing with news about AI agents. But how do you implement them successfully, and why?

Agentic

agentic

2 Posts
The foundations of a secure agentic architecture
Cédric Thibault
agentic ai cybersecurity architecture

The foundations of a secure agentic architecture

AI agents with elevated privileges present critical security risks that require the implementation of strict measures, such as the principle of least privilege and human oversight, to secure automation.

MCP - The Explosion of Agentic AI
Cédric Thibault
genai agentic mcp

MCP - The Explosion of Agentic AI

The MCP protocol was recently released by Anthropic and adopted by many companies. Discover the potential of this protocol in this article.

Agenticai

agenticAI

1 Posts
The Right Strategies for Implementing AI Agents
Cédric Thibault
agentAI agenticAI cloud strategy

The Right Strategies for Implementing AI Agents

The internet is buzzing with news about AI agents. But how do you implement them successfully, and why?

Ai

ai

3 Posts
The foundations of a secure agentic architecture
Cédric Thibault
agentic ai cybersecurity architecture

The foundations of a secure agentic architecture

AI agents with elevated privileges present critical security risks that require the implementation of strict measures, such as the principle of least privilege and human oversight, to secure automation.

How to secure the new generation of EUD
Cédric Thibault
vibe coding ai cybersecurity strategy

How to secure the new generation of EUD

To counter the risks of "Shadow GenAI", an in-depth defense strategy combining business collaboration, agent identity control, and perimeter data protection is necessary

AI browsers, a risky innovation
Cédric Thibault
browser ai innovation

AI browsers, a risky innovation

Before celebrating Atlas and AI browsers, let's remember that these browsers can be hijacked by hidden instructions in web pages to act maliciously with your authenticated privileges.

Architecture

architecture

2 Posts
The foundations of a secure agentic architecture
Cédric Thibault
agentic ai cybersecurity architecture

The foundations of a secure agentic architecture

AI agents with elevated privileges present critical security risks that require the implementation of strict measures, such as the principle of least privilege and human oversight, to secure automation.

No, the AWS outage doesn't necessarily strengthen multi-cloud
Cédric Thibault
architecture multi-cloud strategy

No, the AWS outage doesn't necessarily strengthen multi-cloud

This article refutes simplistic reactions to the AWS outage (like multi-cloud or the return to on-prem) and refocuses the debate on the need for resilient and highly decoupled architectures.

Aws

aws

8 Posts
2025 Status Report on Cloud Threats and Strategies
Cédric Thibault
aws cloud security cybersecurity strategy

2025 Status Report on Cloud Threats and Strategies

As the year is well underway, let's take stock of the specific threats to the Cloud and recommended strategies.

Data Encryption in AWS
Cédric Thibault
aws keys cybersecurity kms crypto

Data Encryption in AWS

There are many options for encrypting data in AWS. It is important to understand the benefits of each.

Securing Your AWS Access Keys
Cédric Thibault
aws keys cybersecurity iam

Securing Your AWS Access Keys

AWS Access Keys are very convenient for command-line connection. They are also dangerous if misused.

AWS Security Basics - A Beginner's Guide
Cédric Thibault
aws introduction beginner security

AWS Security Basics - A Beginner's Guide

Security in AWS is a topic that can prove complex, and it is sometimes useful to start by reviewing the basics.

Analysis of Datadog's 2024 State of Cloud Security Report
Cédric Thibault
aws cloud cybersecurity report

Analysis of Datadog's 2024 State of Cloud Security Report

Datadog is a well-known player in cloud security, and its state of security report is always full of insights.

Organizing your landing zone
Cédric Thibault
aws cloud landingzone security

Organizing your landing zone

Setting up a landing zone is a prerequisite for the secure evolution of your cloud consumption.

Track the deployment of your SCPs
Cédric Thibault
aws cloud guardrail security

Track the deployment of your SCPs

Deploying SCPs in AWS can be a source of unwanted blockages. Track the effects of your SCPs with these metrics.

Stop Exposing Public S3 Buckets (at scale)
Cédric Thibault
aws cloud data security

Stop Exposing Public S3 Buckets (at scale)

Data exposure stored in S3 buckets remains a hot topic despite AWS measures. Let's see how to deal with it for good.

Beginner

beginner

1 Posts
AWS Security Basics - A Beginner's Guide
Cédric Thibault
aws introduction beginner security

AWS Security Basics - A Beginner's Guide

Security in AWS is a topic that can prove complex, and it is sometimes useful to start by reviewing the basics.

Browser

browser

1 Posts
AI browsers, a risky innovation
Cédric Thibault
browser ai innovation

AI browsers, a risky innovation

Before celebrating Atlas and AI browsers, let's remember that these browsers can be hijacked by hidden instructions in web pages to act maliciously with your authenticated privileges.

Cloud

cloud

7 Posts
The responsibility of security in the Cloud
Cédric Thibault
security cloud strategy

The responsibility of security in the Cloud

When security is everybody's business, it becomes nobody's responsibility. Why total decentralization of IT security is a bad idea.

The Right Strategies for Implementing AI Agents
Cédric Thibault
agentAI agenticAI cloud strategy

The Right Strategies for Implementing AI Agents

The internet is buzzing with news about AI agents. But how do you implement them successfully, and why?

2025 Status Report on Cloud Threats and Strategies
Cédric Thibault
aws cloud security cybersecurity strategy

2025 Status Report on Cloud Threats and Strategies

As the year is well underway, let's take stock of the specific threats to the Cloud and recommended strategies.

Analysis of Datadog's 2024 State of Cloud Security Report
Cédric Thibault
aws cloud cybersecurity report

Analysis of Datadog's 2024 State of Cloud Security Report

Datadog is a well-known player in cloud security, and its state of security report is always full of insights.

Organizing your landing zone
Cédric Thibault
aws cloud landingzone security

Organizing your landing zone

Setting up a landing zone is a prerequisite for the secure evolution of your cloud consumption.

Track the deployment of your SCPs
Cédric Thibault
aws cloud guardrail security

Track the deployment of your SCPs

Deploying SCPs in AWS can be a source of unwanted blockages. Track the effects of your SCPs with these metrics.

Stop Exposing Public S3 Buckets (at scale)
Cédric Thibault
aws cloud data security

Stop Exposing Public S3 Buckets (at scale)

Data exposure stored in S3 buckets remains a hot topic despite AWS measures. Let's see how to deal with it for good.

Crypto

crypto

1 Posts
Data Encryption in AWS
Cédric Thibault
aws keys cybersecurity kms crypto

Data Encryption in AWS

There are many options for encrypting data in AWS. It is important to understand the benefits of each.

Cybersecurity

cybersecurity

6 Posts
The foundations of a secure agentic architecture
Cédric Thibault
agentic ai cybersecurity architecture

The foundations of a secure agentic architecture

AI agents with elevated privileges present critical security risks that require the implementation of strict measures, such as the principle of least privilege and human oversight, to secure automation.

How to secure the new generation of EUD
Cédric Thibault
vibe coding ai cybersecurity strategy

How to secure the new generation of EUD

To counter the risks of "Shadow GenAI", an in-depth defense strategy combining business collaboration, agent identity control, and perimeter data protection is necessary

2025 Status Report on Cloud Threats and Strategies
Cédric Thibault
aws cloud security cybersecurity strategy

2025 Status Report on Cloud Threats and Strategies

As the year is well underway, let's take stock of the specific threats to the Cloud and recommended strategies.

Data Encryption in AWS
Cédric Thibault
aws keys cybersecurity kms crypto

Data Encryption in AWS

There are many options for encrypting data in AWS. It is important to understand the benefits of each.

Securing Your AWS Access Keys
Cédric Thibault
aws keys cybersecurity iam

Securing Your AWS Access Keys

AWS Access Keys are very convenient for command-line connection. They are also dangerous if misused.

Analysis of Datadog's 2024 State of Cloud Security Report
Cédric Thibault
aws cloud cybersecurity report

Analysis of Datadog's 2024 State of Cloud Security Report

Datadog is a well-known player in cloud security, and its state of security report is always full of insights.

Data

data

1 Posts
Stop Exposing Public S3 Buckets (at scale)
Cédric Thibault
aws cloud data security

Stop Exposing Public S3 Buckets (at scale)

Data exposure stored in S3 buckets remains a hot topic despite AWS measures. Let's see how to deal with it for good.

Genai

genai

1 Posts
MCP - The Explosion of Agentic AI
Cédric Thibault
genai agentic mcp

MCP - The Explosion of Agentic AI

The MCP protocol was recently released by Anthropic and adopted by many companies. Discover the potential of this protocol in this article.

Guardrail

guardrail

1 Posts
Track the deployment of your SCPs
Cédric Thibault
aws cloud guardrail security

Track the deployment of your SCPs

Deploying SCPs in AWS can be a source of unwanted blockages. Track the effects of your SCPs with these metrics.

Iam

iam

1 Posts
Securing Your AWS Access Keys
Cédric Thibault
aws keys cybersecurity iam

Securing Your AWS Access Keys

AWS Access Keys are very convenient for command-line connection. They are also dangerous if misused.

Innovation

innovation

1 Posts
AI browsers, a risky innovation
Cédric Thibault
browser ai innovation

AI browsers, a risky innovation

Before celebrating Atlas and AI browsers, let's remember that these browsers can be hijacked by hidden instructions in web pages to act maliciously with your authenticated privileges.

Introduction

introduction

1 Posts
AWS Security Basics - A Beginner's Guide
Cédric Thibault
aws introduction beginner security

AWS Security Basics - A Beginner's Guide

Security in AWS is a topic that can prove complex, and it is sometimes useful to start by reviewing the basics.

Keys

keys

2 Posts
Data Encryption in AWS
Cédric Thibault
aws keys cybersecurity kms crypto

Data Encryption in AWS

There are many options for encrypting data in AWS. It is important to understand the benefits of each.

Securing Your AWS Access Keys
Cédric Thibault
aws keys cybersecurity iam

Securing Your AWS Access Keys

AWS Access Keys are very convenient for command-line connection. They are also dangerous if misused.

Kms

kms

1 Posts
Data Encryption in AWS
Cédric Thibault
aws keys cybersecurity kms crypto

Data Encryption in AWS

There are many options for encrypting data in AWS. It is important to understand the benefits of each.

Landingzone

landingzone

1 Posts
Organizing your landing zone
Cédric Thibault
aws cloud landingzone security

Organizing your landing zone

Setting up a landing zone is a prerequisite for the secure evolution of your cloud consumption.

Mcp

mcp

1 Posts
MCP - The Explosion of Agentic AI
Cédric Thibault
genai agentic mcp

MCP - The Explosion of Agentic AI

The MCP protocol was recently released by Anthropic and adopted by many companies. Discover the potential of this protocol in this article.

Multi-cloud

multi-cloud

1 Posts
No, the AWS outage doesn't necessarily strengthen multi-cloud
Cédric Thibault
architecture multi-cloud strategy

No, the AWS outage doesn't necessarily strengthen multi-cloud

This article refutes simplistic reactions to the AWS outage (like multi-cloud or the return to on-prem) and refocuses the debate on the need for resilient and highly decoupled architectures.

Report

report

1 Posts
Analysis of Datadog's 2024 State of Cloud Security Report
Cédric Thibault
aws cloud cybersecurity report

Analysis of Datadog's 2024 State of Cloud Security Report

Datadog is a well-known player in cloud security, and its state of security report is always full of insights.

Security

security

6 Posts
The responsibility of security in the Cloud
Cédric Thibault
security cloud strategy

The responsibility of security in the Cloud

When security is everybody's business, it becomes nobody's responsibility. Why total decentralization of IT security is a bad idea.

2025 Status Report on Cloud Threats and Strategies
Cédric Thibault
aws cloud security cybersecurity strategy

2025 Status Report on Cloud Threats and Strategies

As the year is well underway, let's take stock of the specific threats to the Cloud and recommended strategies.

AWS Security Basics - A Beginner's Guide
Cédric Thibault
aws introduction beginner security

AWS Security Basics - A Beginner's Guide

Security in AWS is a topic that can prove complex, and it is sometimes useful to start by reviewing the basics.

Organizing your landing zone
Cédric Thibault
aws cloud landingzone security

Organizing your landing zone

Setting up a landing zone is a prerequisite for the secure evolution of your cloud consumption.

Track the deployment of your SCPs
Cédric Thibault
aws cloud guardrail security

Track the deployment of your SCPs

Deploying SCPs in AWS can be a source of unwanted blockages. Track the effects of your SCPs with these metrics.

Stop Exposing Public S3 Buckets (at scale)
Cédric Thibault
aws cloud data security

Stop Exposing Public S3 Buckets (at scale)

Data exposure stored in S3 buckets remains a hot topic despite AWS measures. Let's see how to deal with it for good.

Strategy

strategy

5 Posts
How to secure the new generation of EUD
Cédric Thibault
vibe coding ai cybersecurity strategy

How to secure the new generation of EUD

To counter the risks of "Shadow GenAI", an in-depth defense strategy combining business collaboration, agent identity control, and perimeter data protection is necessary

No, the AWS outage doesn't necessarily strengthen multi-cloud
Cédric Thibault
architecture multi-cloud strategy

No, the AWS outage doesn't necessarily strengthen multi-cloud

This article refutes simplistic reactions to the AWS outage (like multi-cloud or the return to on-prem) and refocuses the debate on the need for resilient and highly decoupled architectures.

The responsibility of security in the Cloud
Cédric Thibault
security cloud strategy

The responsibility of security in the Cloud

When security is everybody's business, it becomes nobody's responsibility. Why total decentralization of IT security is a bad idea.

The Right Strategies for Implementing AI Agents
Cédric Thibault
agentAI agenticAI cloud strategy

The Right Strategies for Implementing AI Agents

The internet is buzzing with news about AI agents. But how do you implement them successfully, and why?

2025 Status Report on Cloud Threats and Strategies
Cédric Thibault
aws cloud security cybersecurity strategy

2025 Status Report on Cloud Threats and Strategies

As the year is well underway, let's take stock of the specific threats to the Cloud and recommended strategies.

Vibe coding

vibe coding

1 Posts
How to secure the new generation of EUD
Cédric Thibault
vibe coding ai cybersecurity strategy

How to secure the new generation of EUD

To counter the risks of "Shadow GenAI", an in-depth defense strategy combining business collaboration, agent identity control, and perimeter data protection is necessary

ProtectYourIT
  • Home
  • About
  • Contact
  • Authors