Attacking & Protecting Against XML External Entity (XXE) Attacks
XML External Entity Attacks are just one of many that attackers can use to successfully compromise your tech assets and data. Learn more about how they fit into the larger picture of your security strategy, and what you can do to stay vigilant against threats!
Common Mistakes People Make Architecting for DynamoDB That Lead to Cost Overruns
Between building products in house and consulting on AWS cloud infrastructure and security, we have a lot of firsthand experience working with DynamoDB. Check out this post about common mistakes made in this AWS service, and how you can avoid them within your cloud accounts!
The Hypothetical Cloud Organization
Before you jump in with both feet to the cloud, you’ll want to make sure you’re setting yourself up for success. Whether you’re a single person starting a new company or an established organization, everyone needs to same components of cloud organization to be successful. Read on to learn more about the key components of setting up your cloud infrastructure without losing sight of key risk mitigation components.
Contract Traps for Startups
Business to business (B2B) tech startups can easily fall into the trap of contract fraud, which can lead to serious legal consequences and damage to their reputation. Learn more today about easy ways to avoid falling into this trap and exposing your new company to excessive risk.
Apache Spot… the end of the road
Now’s a great time to check out one of our past projects; the Apache Spot Project. Learn more today from our CEO Austin Leahy!
What is Zero Trust?
Zero trust is a security model that assumes that any user, device, or application attempting to access a network or resource cannot be trusted by default. Click here to learn more about setting up zero trust models from Tadd Wood!
Cloud vs. on-premise costs, and your security responsibilities in AWS
Moving to the cloud can seem easy at first, but it’s important not to take on too much spend accidentally by not setting up your environment the right way. Read here about the best tips we have to manage your cloud spending and risk!
Cloud IAM: a primer
Identity and access management is a fundamental part of a successful cloud environment. Learn the basic things you need to know here!
Don’t be fooled; MX records aren’t the last step
Email records are some of the most vulnerable forms of communication that can expose a company to risk. Learn how to protect these easily compromised assets here:
What is Kerberos
Kerberos is a widely-industry standard authentication method that can help you secure your systems. Learn more here: