LastPass Hacked — What’s The Security Impact?

Yesterday, LastPass announced to their users and the public that their service was hacked. At this early...

Richard Stiennon and Tim Prendergast Talk Cloud Security Trends

Richard Stiennon, Chief Research Analyst at IT Harvest sat down with Evident.io CEO Tim Prendergast to talk...

Compliance is Hard – Tales from ChefConf 2015

What an awesome experience ChefConf 2015 was! I've been to every single ChefConf, and I have to say, I learn more and...

The Marriage of DevOps and SecOps

The rise of cloud computing brings many exciting changes to the technology industry: elastic scalability of resources,...

AWS Announces Important AWS Security Maintenance Advisory

IMPORTANT ANNOUNCEMENTAWS has released an important announcement about a Xen hypervisor security advisory that requires...

AWS Security How-To: Protecting CloudTrails Data

When attackers breach your network, their first priority is to get their meat-hooks into your organization without being...

Managing 3rd Party Access to your AWS Accounts

Signing up for cloud-based SaaS services to go along with your shiny new AWS account is an eventuality. From security to...

GHOSTbusting in AWS

Earlier this week, CVE-2015-0235 was unveiled, exposing a vulnerable set of common calls in the glibc library....

Avoiding the Top 5 Most Common AWS Security Risks

According to IBM’s 2014 Cyber Security Intelligence Index, 95% of all security incidents involve human...

Implementing AWS IAM Best Practices is Your Responsibility

If you find yourself worried at night when you go to sleep whether you've properly secured your AWS IAM users or API...

Why Azure’s Moves Matter

Azure announced a series of new features and technologies that actually moved the needle in their battle to...

Cloud Services Killed the Server… Again

I've often stared deep into the eyes of a colleague when I mutter the words "services killed the server". Not because I...