Blog
Explore our latest blogs, where we cover everything from software security and threat modeling to compliance and risk management – covering the topics that matter to you.
Threat Modeling for 5G Cybersecurity
5G structures are the next step in the development of mobile networking. We are about to embark on a next generation system level that emboldens...
More Than 752,000 US Birth Certificates Leaked, New Orleans Declares a State of Emergency and More
Over 752,000 applications for birth certificate copies were leaked,all because they were not protected with a password in an Amazon Web Services (AWS)...
AWS re:Invent 2019 Recap Part Two
It’s been two weeks since AWS re: invent 2019 took place in Las Vegas, Nevada. As the biggest cloud computing conference in the country, Amazon Web...
The Collateral Damage of a Social Profile Data Breach
The previous installment in our series on the collateral damage, which a data breach can wreak upon individuals, we considered the profound...
AWS re:Invent 2019 Cloud Technology Conference Recap
AWS re:Invent came and went, but not without its fair share of product launches, software updates, and service releases. This year the cloud...
Collateral Damage of a Credit Card Data Breach for the Enterprise
A majority of the public discussion on cybersecurity and compromised identities has centered on consideration of a credit card data breach – to the...
Top 10 Cybersecurity Predictions for 2020
We are leaving behind a year that, statistically, was higher than average in cyberattacks and data breaches. As we near the end of 2019, we can look...
How to Secure Your Amazon S3 File Storage Service
Amazon S3 is the leading and most efficient file storage service offered in the market. S3 is a simple storage service where you can store any kind of...
Most Common Troubleshoot Issues with AWS Serverless Application Repository
Serverless refers to the innate structural design of the cloud that allows users to move more of their active tasks to Amazon Web Services (AWS). The...