Jan 2, 2020 | API Security, AWS, Cloud security, Threat Modeling
Organizations migrating to a public cloud often face the same challenge: a major architectural variation between various base components such as monitoring and storage. VMware Cloud on AWS (Amazon Web Services) is committed to delivering steady software defined data...
Dec 19, 2019 | AWS, Recent News, Threat Modeling
Over 752,000 applications for birth certificate copies were leaked,all because they were not protected with a password in an Amazon Web Services (AWS) storage bucket. Long story short, plenty of personal information was divulged. The certificates were warehoused by an...
Dec 3, 2019 | Enterprise Threat Modeling, Security, Threat Modeling
Amazon Elastic Container Service (Amazon ECS) consists of a decidedly accessible container management service that enables Docker containers to be effortlessly managed on a group of servers known as clusters. Users can host their cluster on a serverless foundation...
Nov 26, 2019 | Threat Modeling
Approximately 1.2 billion records on an unsecured Google Cloud Services database were found on the web. Vinny Troia, a cybersecurity researcher with a focus on the Dark Web, found 1.2 billion records on an unsecured server. A total of 4 terabytes of personal...
Nov 20, 2019 | Threat Modeling
Data integrity is best defined as the accuracy, consistency and reliability of data in transit and at rest. Quality data adheres to a number of standards, beginning with confidentiality, integrity and availability (CIA). Commonly known as the CIA triad, any...
Nov 6, 2019 | Recent News, Threat Modeling
There were 111 data breaches during the month of October, an alarmingly high number. It’s no news that 2019 is already shaping up to be the worst year for cyberattacks. In the US, there were 3,800 disclosed data breaches during the first six months. Hackers...