AWS Security Groups: What They Are and How to Get the Most Out of Them

AWS Security Groups are a flexible tool to help you secure your Amazon EC2 instances. AWS Security Groups are just one of several tools AWS offers to help you secure your cloud environment, but that doesn’t mean AWS security is hands-off. You&#82… Continue reading AWS Security Groups: What They Are and How to Get the Most Out of Them

AWS Security Best Practices: Lambda DoS Mitigation Strategies

Overview
How to avoid DoS and design resilient serverless applications is one of the most common topics we hear when discussing AWS Lambda security with organizations that are in the process of adopting serverless architectures.
The post AWS Secur… Continue reading AWS Security Best Practices: Lambda DoS Mitigation Strategies

AWS Security Best Practices: AWS Lambda Security – Design for Failure

For security experts, the terms “Remote Code Execution” (RCE) or “Arbitrary Code Execution” makes the hairs on the back of their neck stand on end. This is because RCE is among the worst-case scenarios of a cyber attack – a… Continue reading AWS Security Best Practices: AWS Lambda Security – Design for Failure

Talking Serverless And AWS Lambda Security With Jeff Forristal

Introduction
In my previous blog interview with Jeremiah Grossman, I mentioned that throughout the years, I befriended a small group of people, with which every discussion is always intriguing, challenging and truly inspiring. Jeff Forristal … Continue reading Talking Serverless And AWS Lambda Security With Jeff Forristal

22 Most Under-Used AWS Security Metrics

22 AWS Security Pros Reveal the Most Underused/Under-Appreciated AWS Security Metrics AWS offers a variety of built-in security features that users can take advantage of, but it’s easy for users of all experience levels to get lost in the sea of … Continue reading 22 Most Under-Used AWS Security Metrics

How to Find and Remediate Open Infrastructure Ports

The evidence is clear — open infrastructure ports lead to security vulnerabilities. When AWS S3 buckets or SSH ports are left open, they can leave your organization at risk for security breaches. For example, in July 2018, an open S3 bucket at a … Continue reading How to Find and Remediate Open Infrastructure Ports

21 InfoSec and AWS Experts Reveal the #1 Mistake Companies Make When It Comes to AWS Security (and How to Avoid It)

More companies are moving to the cloud than ever before. Amazon Web Services (AWS) is one of the most popular cloud platforms, and for good reason: AWS provides a robust set of features and services that give it broad appeal among businesses of all siz… Continue reading 21 InfoSec and AWS Experts Reveal the #1 Mistake Companies Make When It Comes to AWS Security (and How to Avoid It)