Knowledge sharing

At O3 Cyber, we're committed to advancing cloud security through knowledge sharing. Our experts contribute to the field via podcasts, technical content, and presentations. We also offer private workshops, bringing our insights directly to organizations. By pushing boundaries and challenging conventions, we aim to elevate industry-wide expertise in cloud security.

Post image
A Buyer’s Guide to Cloud Security Platform

A cloud security platform combines capabilities such as Cloud Security Posture Management (CSPM), Cloud Workload Protection Platforms (CWPP), and Cloud Infrastructure Entitlement Management (CIEM). Though often marketed as an "all-in-one" solution, we'll refer to it simply as a cloud security platform for clarity.

Read article ->
Post image
Your Logs Might Be Lying: A Deep Dive into Azure Integrity

A few weeks ago I had an interesting observation while trying to ship Windows Event Logs from VM Scale Sets to an external SIEM hosted on-premises, and how Microsoft supports these not so well documented ways of doing it (we’ll come back to this later), and potentially undermining the integrity of the collected data due to lack of visibility into the collection process.

Read article ->
Post image
Special Episode with Nora Bodin and Anna Beruldsen at Sikkerhetsfestivalen 2025

In this special edition of the O3 Cloud Security Podcast we are coming live from Sikkerhetsfestival 2025 in Lillehammer. Nora Bodin and Anna Beruldsen are two very talented Cyber security Consultants working at mnemonic. In this episode we discuss DevSecOps, and how to create efficient security programs within the DevOps-culture at scale.

Listen to episode
Post image
Special Episode with Nora Tomas at Sikkerhetsfestivalen 2025

In this special edition of the O3 Cloud Security Podcast we are coming live from Sikkerhetsfestival 2025 in Lillehammer. Nora Tomas is a Senior Software Engineer working with authentication and authorization at Vipps, a Norwegian mobile payment application. In this episode we discuss security from the perspective of a SWE, and how to create efficient authentication at scale.

Listen to episode
Post image
Norwegian Cyber Security Market Analysis - FY 2024

This report provides a detailed analysis of the Norwegian cybersecurity market's financial performance for the 2024 fiscal year. In an industry often driven by speculation, this analysis is grounded in concrete data, focusing on the hard numbers. This year's report is the most comprehensive to date, incorporating new data on Cost of Goods Sold (COGS), employee statistics, and salaries to present a complete and accurate view of the market.

Read article ->
Post image
Terraforming On-Premises logs to Sentinel

Many organizations leverage Microsoft Sentinel's powerful features and capabilities to create a centralized platform where all logs are collected, analyzed, and acted upon. While cloud objects are often easier to integrate, configuring VMs located on-premises requires additional setup—especially when ingesting custom logs.

Read article ->