Dec 18, 2019 | AWS, Cloud security, Events
It’s been two weeks since AWS re: invent 2019 took place in Las Vegas, Nevada. As the biggest cloud computing conference in the country, Amazon Web Services didn’t disappoint with a turnout of more than 65,000 attendees. AWS re:Invent revealed details about a heap of...
Nov 20, 2019 | Security, Threat Models
From the hobbyist looking for exciting recreation, to air force commanders coordinating military campaigns, Unmanned Arial Vehicles (UAV) – otherwise known as drones – have permeated our everyday lives. As one might expect, where there’s emerging technology based on...
Nov 20, 2019 | Threat Modeling
Data integrity is best defined as the accuracy, consistency and reliability of data in transit and at rest. Quality data adheres to a number of standards, beginning with confidentiality, integrity and availability (CIA). Commonly known as the CIA triad, any...
Nov 19, 2019 | Cloud security, DevSecOps
Nowadays, organizations are shifting their focus from DevOps – an approach to the software development life cycle (SDLC), which applies to the origin of a project, through deployment. Within SDLC, the DevSecOps approach integrates security as early as the planning...