Attacking & Protecting Against XML External Entity (XXE) Attacks
XML External Entity Attacks are just one of many that attackers can use to successfully compromise your tech assets and data. Learn more about how they fit into the larger picture of your security strategy, and what you can do to stay vigilant against threats!
The Hypothetical Cloud Organization
Before you jump in with both feet to the cloud, you’ll want to make sure you’re setting yourself up for success. Whether you’re a single person starting a new company or an established organization, everyone needs to same components of cloud organization to be successful. Read on to learn more about the key components of setting up your cloud infrastructure without losing sight of key risk mitigation components.
Contract Traps for Startups
Business to business (B2B) tech startups can easily fall into the trap of contract fraud, which can lead to serious legal consequences and damage to their reputation. Learn more today about easy ways to avoid falling into this trap and exposing your new company to excessive risk.
Blast radius of risk in AWS
It’s critical in your cloud environment to understand the downstream and upstream risk exposed to your environment when you make different security and infrastructure choices. Click here to learn about evaluating your blast radius of risk, and how to mitigate impact to your environment!
Ethical walls and their importance for data privacy
Understanding what an ethical wall looks like and how to set it up effectively will set up your organization for great future success, and allow senior leaders to consistently monitor and track success metrics. Learn more today about the key components and how you can use what you already have to expeditiously grow your compliance programs!
Apache Spot… the end of the road
Now’s a great time to check out one of our past projects; the Apache Spot Project. Learn more today from our CEO Austin Leahy!
What is Zero Trust?
Zero trust is a security model that assumes that any user, device, or application attempting to access a network or resource cannot be trusted by default. Click here to learn more about setting up zero trust models from Tadd Wood!
Cloud vs. on-premise costs, and your security responsibilities in AWS
Moving to the cloud can seem easy at first, but it’s important not to take on too much spend accidentally by not setting up your environment the right way. Read here about the best tips we have to manage your cloud spending and risk!
Don’t get Lured by Phishing Schemes
We’ve seen a huge rise in successful phishing schemes in the first quarter of 2023, and the ways attackers successfully pull these off have become much more sophisticated. Click here to learn more about different types of traps and how to prevent yourself from being compromised!
Cloud IAM: a primer
Identity and access management is a fundamental part of a successful cloud environment. Learn the basic things you need to know here!