Max SaltonstallHow do security researchers get hacked?Insight into a state-sponsored hacking group and how it tries to compromise professional researchers2 min read·Feb 1, 2021----
Max SaltonstallinGoogle Cloud - CommunityFaster onboarding in a fully remote worldHiring new people during a global pandemic isn’t usually covered in your standard HR or IT handbooks.8 min read·Nov 19, 2020----
Max SaltonstallinGoogle Cloud - CommunityBuilding AI Talent to accelerate your businessWhat’s a horizontal AI team, and why do I need one at my business?4 min read·Oct 22, 2020----
Max SaltonstallinGoogle Cloud - CommunityImproving marketplace integrations with PandiumScaling multi-tenant architecture with Kubernetes6 min read·Apr 1, 2020----
Max SaltonstallShifting to Context-Aware Access over timePerimeter security is dangerous, and should be abandoned. Companies see this, and yet struggle to move to context-aware access.8 min read·Mar 15, 2019----
Max SaltonstallinGoogle Cloud - CommunityMoving your identity to the cloudWhy move your identity from the safety of local AD or LDAP? You can get all kinds of benefits from the cloud, including…7 min read·Feb 5, 2019----
Max SaltonstallinGoogle Cloud - CommunityHow to get Cloud Identity-Aware Proxy up and runningYou wouldn’t let a passenger on a plane without first inspecting who they are and what they’re carrying, and you should…7 min read·Jan 29, 2019--1--1
Max SaltonstallinGoogle Cloud - CommunitySecure your devices, and theirs: BYOD and device managementTo make good decisions about access, you need to gather data about all the devices your employees will use.5 min read·Jan 23, 2019--1--1
Max SaltonstallinGoogle Cloud - CommunityWhat is BeyondCorp? What is Identity-Aware Proxy?Your company holds very sensitive data: about your clients, your business, your employees. Your employees need to use a variety of…6 min read·Jan 16, 2019--2--2