Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Creating AWS security efficiencies in IT

As we enter 2023, both security and digital transformation efforts (e.g. cloud migration) continue to be important priorities for organizations. This combination brings huge challenges for IT teams, who are not only required to facilitate major digital changes and increase developer productivity but also ensure that this transformation is secure by default. When using AWS in particular, it’s challenging to understand how to strike this balance between accelerated cloud growth and security.

The Future of IoT Security for Axeda Customers

Recently, Device Authority’s CTO James Penney recorded a podcast with Axeda Co-Founder and CTO Jim Hansen. Full disclosure: I was the first Salesperson hired by Axeda in 2001 and I can personally attest that at the time many companies thought we were out of our minds! In the early days, Axeda’s biggest challenge was getting machine makers to use this new thing called the Internet to remotely manage their high value assets in the field.

Three easy steps to dramatically improve your AWS security posture: Step 1, set up IAM properly

Have you ever heard the saying that the greatest benefit of the cloud is that limitless resources can be spun-up with just a few clicks of the mouse? If so, you would be best served by forgetting that saying altogether. Just because cloud resources can be spun-up with a few clicks of the mouse does not mean that they should be. Rather, prior to launching anything in the cloud, careful consideration and planning are a necessity.

Cloud Native Security: The 4C Approach, The 3Rs & Strategies for Cloud Native Security

Many organizations today develop, build and deploy cloud native applications that utilize infrastructure and services offered by cloud computing providers like AWS, Azure or Google Cloud Platform (GCP). This trend highlights a critical consideration for organizations — how to secure applications, infrastructures and data in cloud-native systems.

Shadow and Zombie APIs: How to Improve Your API Security

APIs are everywhere, enabling businesses to maximize business value. From digital transformation and application modernization to cloud migration and microservices, API-first app architectures are finding their way into every technology touchpoint, giving rise to API sprawl. Consequently, most DevOps and security teams are uncertain about all the active and exposed APIs, and are lacking proper strategies to manage API sprawl.

Securing Non-human Identities and Managing Secrets in Multi-cloud Environments

Cloud migration and digital transformation have led to an explosion of non-human identities that need to be secured across multiple cloud and hybrid environments. And more identities mean more secrets that need to be secured, rotated and managed. That's where SaaS-based secrets management can help. In this eBook, you'll learn about: Want to learn more about SaaS-based secrets management? Schedule a meeting to speak to one of our experts today!

[Webinar] Exposing Leaked Secrets Inside Android Apps! Cybernews & GitGuardian

Our Friends at Cybernews recently released some shocking research that showed thousands of Android applications are leaking hard-coded secrets like API keys. We are super excited to be sitting down with Cybernews researcher Vincentas Baubonis to take a deep dive into this study and uncover why this is such a pervasive vulnerability in Android Applications.

Amazon EFS Backup and Restore for Amazon EKS

Amazon Elastic File System (EFS) is a simple, scalable and fully managed file storage service to support the storage and throughput needs of your Kubernetes applications. Amazon EFS is designed to be highly available and durable, however your EFS data can still be prone to data loss, data corruption, and have compliance issues. Amazon EFS Backup and Restore of data helps protect against data loss due to hardware failures, accidental deletion, ransomware attacks, or other types of disasters.

How to build a secure API gateway in Node.js

Microservices offer significant advantages compared to monoliths. You can scale the development more easily and have precise control over scaling infrastructure. Additionally, the ability to make many minor updates and incremental rollouts significantly reduces the time to market. Despite these benefits, microservices architecture presents a problem — the inability to access its services externally. Fortunately, an API gateway can resolve this issue.