Data Security Breach
This blog post reviews best practices and pro tips for using Amazon Web Services securely, Identity and Access Management, and the risks faced when not setup correctly.
PASTA Threat Modeling
Tony started VerSprite with the idea of developing a team of ‘security hybrids’ – consummate security professionals that personify both technical mastery around emerging technologies and associated threats.
Secure Socket Layers
As of the latest release of Chrome, sites not using TLS encryption are being called out in the address bar. Users will now see a “Not Secure” label when visiting sites over plain HTTP, even if the site does not transmit sensitive information.
Operating your cloud infrastructure isn’t a one-time proposition, so it makes sense that securing it isn’t either. Establishing security compliance controls and then continuously monitoring those controls ensures your infrastructure continues to be secured per policy.
Throughout my testing and implementation of JEA in a private network I was able to discover more reasons why JEA is such an underused but powerful tool.
Imagine this scenario: You are a systems engineer. You are tasked with managing user and group access controls. Your company’s two person NOC team has admin rights to perform triage work. Eventually, you discover that your company is compromised and has been for an unknown length of time.
We are an international squad of professionals working as one.
Copyright 2018 VerSprite - All Rights Reserved