
AWS Security and some basic things
AWS has a very granular set of Security layers. AWS Security Hub needs to be used when deploying into AWS. NIST, OWASP, CIS, CNCF, OSCAP and other models shoul…
Read More »

AWS has a very granular set of Security layers. AWS Security Hub needs to be used when deploying into AWS. NIST, OWASP, CIS, CNCF, OSCAP and other models shoul…
Read More »
What is Security Hub? As a solution, AWS launched its integrated security tool called AWS Security Hub (in 2018), which can provide a comprehensive view of you…
Read More »
Overview of SAML, STS, AD in AWS. All necessary when building hybrid and integrated corporate applications and systems. Often the infrastructure, AD and access…
Read More »
As more organizations have turned to the cloud to store and work with their data, applications and other assets, cybercriminals are increasingly exploiting clo…
Read More »
Automating network security entails using technology to detect, investigate, and mediate network security threats. Typically, software and other tools are depl…
Read More »
Part 1: Why Storage Managers Need to Prepare for the Ransomware Scourge Certain parts of the enterprise are more concerned about ransomware than others. The se…
Read More »
Understanding infrastructure ransomware Ransomware is a type of malware that targets anything it can get into — including backups — to steal or loc…
Read More »
Cloud Vulnerability Scanning can be defined as a process of identifying security risks in Cloud-based applications and infrastructure. Cloud Vulnerability Scan…
Read More »
What are they? Backend cloud services are the operations and routines end users don’t see but are essential to provide resilience and secure access to ba…
Read More »