Why It’s Time to Update Your Endpoint Security Approach

When it comes to cyber threats, the endpoint is often where the action is. In today’s post, we’ll discuss why it’s time to update your endpoint security approach. We’ll also offer some recommendations for how to go about this.
Continue reading Why It’s Time to Update Your Endpoint Security Approach

Serverless Security Forensic Data Analysis With PureSec

My two previous blog posts covered one of my favorite topics related to serverless security, the first blog post demonstrated how you can automate SQL Injection testing by using SQLMap together with ‘Lambda-Proxy’, a small utility deve… Continue reading Serverless Security Forensic Data Analysis With PureSec

Securing Serverless – Blog Series – Episode 0x06 – Don’t Just Stand There…Do Something!

Wow, we’re already at the sixth installment of the “Securing Serverless” blog series. Here’s a quick recap of previous episodes:
The post Securing Serverless – Blog Series – Episode 0x06 – Don’t Just Stand… Continue reading Securing Serverless – Blog Series – Episode 0x06 – Don’t Just Stand There…Do Something!

9 AWS Secrets You Need to Know Before Moving to the Cloud

The post 9 AWS Secrets You Need to Know Before Moving to the Cloud appeared first on Delta Risk.
The post 9 AWS Secrets You Need to Know Before Moving to the Cloud appeared first on Security Boulevard.
Continue reading 9 AWS Secrets You Need to Know Before Moving to the Cloud