Jan 2, 2020 | API Security, AWS, Cloud security, Threat Modeling
Organizations migrating to a public cloud often face the same challenge: a major architectural variation between various base components such as monitoring and storage. VMware Cloud on AWS (Amazon Web Services) is committed to delivering steady software defined data...
Dec 18, 2019 | AWS, Cloud security, Events
It’s been two weeks since AWS re: invent 2019 took place in Las Vegas, Nevada. As the biggest cloud computing conference in the country, Amazon Web Services didn’t disappoint with a turnout of more than 65,000 attendees. AWS re:Invent revealed details about a heap of...
Dec 16, 2019 | CISO, Cloud security, Cloud Threat Modeling, Security, Threat Models
The previous installment in our series on the collateral damage, which a data breach can wreak upon individuals, we considered the profound possibilities of a credit card data breach. This article reviews the potential damages that can occur with a social profile...
Dec 5, 2019 | API Security, AWS, Cloud security, Cloud Threat Modeling, DevSecOps, Security
Amazon S3 is the leading and most efficient file storage service offered in the market. S3 is a simple storage service where you can store any kind of content, e.g. HTML web pages or financial data records. Whatever you store in an S3 bucket is comprised of data. Even...
Dec 4, 2019 | AWS, Cloud security, DevSecOps, ThreatModeler
Serverless refers to the innate structural design of the cloud that allows users to move more of their active tasks to Amazon Web Services (AWS). The migration expands their responsiveness and allots more areas for improvement. With serverless, it is possible to run...
Nov 19, 2019 | Cloud security, DevSecOps
Nowadays, organizations are shifting their focus from DevOps – an approach to the software development life cycle (SDLC), which applies to the origin of a project, through deployment. Within SDLC, the DevSecOps approach integrates security as early as the planning...