Securing Your AWS IAM Cross-Account Roles and Service Roles

AWS Identity and Access Management (IAM) is a powerful service that helps you control access to AWS resources by enabling you to specify who and what is authenticated (signed in) and authorized (has permissions) to use those resources. Since IAM…

Read More

How to Discover Your S3 Bucket Exposures

For many, enterprises Amazon S3 buckets have been revolutionary, especially for those storing and distributing massive amounts of videos and photos. S3, or Simple Storage Service, is public cloud storage within Amazon Web Services (AWS). In a nutshell, they provide…

Read More

Come see us at Gartner Security and Risk Management Summit!

We love that Gartner Security and Risk Management Summit. Year after year the summit continues to provide thought-provoking talks, enlightening conversations, and and important networking activities. This year we’re a sponsor, and we hope to see you there! Read on…

Read More

Do more CISOs mean a greater focus on security concerns?

In early 2016 the percentage of enterprise organizations with Chief Information Security Officers (CISOs) in their C-Suites stood at 50%. In early 2017 that number has already leapt to 65%, representing a 30% increase in just a single year. This…

Read More

Video: Cloud security: don’t harden infrastructure, follow data

Guest blog by David Spark, Spark Media Solutions “Hardening the cloud is a really difficult conversation for someone to have that doesn’t own the infrastructure,” said John Pironti (@jpironti), president, IP Architects, in our conversation at the Black Hat USA…

Read More

Video: There is no time for security (Black Hat 2016)

Guest blog by David Spark, Spark Media Solutions “There’s less and less separation between building out the application and building out the infrastructure. Security has to be built in. It has to be automated. It’s no longer something we deploy…

Read More

Will we be able to control data in the wild? (Black Hat 2016)

Guest blog by David Spark, Spark Media Solutions “Once the data is out there, it’s out of their control,” said Elliot Lewis (@elliotdlewis), VP of security, risk, and compliance research at Info-Tech Research Group, in our conversation at the Black…

Read More