This year we attended KubeCon + CloudNativeCon Europe 2025 event in London.
Read article ->Knowledge sharing
At O3 Cyber, we're committed to advancing cloud security through knowledge sharing. Our experts contribute to the field via podcasts, technical content, and presentations. We also offer private workshops, bringing our insights directly to organizations. By pushing boundaries and challenging conventions, we aim to elevate industry-wide expertise in cloud security.

In this episode of the O3 Cloud Security Podcast, Håkon Sørum and Anja Olsen delve into the intricacies of cloud threat detection, ...
Listen to episodeAs organizations scale their cloud infrastructure, securing assets efficiently becomes a critical challenge.
Read article ->This article intends to share the personal view and experience of the author.
Read article ->When assessing Google Cloud environments, one of the areas that we spend the most time understanding is Identity and Access Management. This article aims to demonstrate the different ways IAM can be assessed in GCP and its pros and cons. Much of the work is about processing and correlating data from multiple sources to determine attack paths.
Read article ->Now that we’ve covered the core components and ways of securing both the control plane and the data plane of a Kubernetes cluster, let’s dive into what actually happens under the hood when you use kubectl, the CLI tool for interacting with Kubernetes.
Read article ->