4 Practices that Should Be Driving Your Security Strategy in 2018

Securing your data and applications in the cloud has never been more important. The headlines are a constant reminder of the disruptive (or calamitous) impact on a business in the wake of a breach. Many of 2017’s most high-profile breaches were a reminder of the vulnerabilities that can come from both inside and outside your..

AWS Security: Bastion Host, NAT instances and VPC Peering

Effective security requires close control over your data and resources. Bastion hosts, NAT instances, and VPC peering can help you secure your AWS infrastructure. Welcome to part four of my AWS Security overview. In part three, we looked at network security at the subnet level. This time, we’ll look at strategies to avoid unnecessarily exposing..

Inside the Cloud – Episode 3: Security, Migration, and Storage on Azure Cloud

Our third episode of Inside the Cloud is all about Microsoft Azure. In this episode, we’ll be focusing on the host of new services and updates on Azure Security, Migration, and Storage recently announced on Microsoft Azure following its annual Ignite conference, held last month in Orlando.  Microsoft Azure’s hybrid cloud platform continues to be a strong..

SQL Injection Lab: Think Like a Hacker

Security is IT’s top spending priority according to the 2017/2018 Computer Economics IT Spending & Staffing Benchmarks report*. Given the frequent changes and updates in vendor platforms, the pressure is on for IT teams who need to keep their infrastructures and data secure. As breaches and attacks become more sophisticated, teams will need to get..

AWS Shared Responsibility Model: Cloud Security

AWS security best practices begin with the AWS Shared Responsibility Model that dictates which security controls are AWS’s responsibility and which are yours. Updated: September 2017 – Inclusion of additional models Over my next several posts, I’ll be discussing AWS security best practices from different perspectives and covering different AWS services. The overall goal is to..

How to set up a web application hacking lab

To learn something well requires practice, and ethical hacking is no exception. Unlike say, practicing the trumpet, practicing hacking has potential legal implications. This means that if you want to practice hacking, you need an environment. In this article, I’ll show you how to set up a basic web application hacking lab, and I’ll give..