Managing 3rd Party Access to your AWS Accounts

Signing up for cloud-based SaaS services to go along with your shiny new AWS account is an eventuality. From security to...

GHOSTbusting in AWS

Earlier this week, CVE-2015-0235 was unveiled, exposing a vulnerable set of common calls in the glibc library....

Avoiding the Top 5 Most Common AWS Security Risks

According to IBM’s 2014 Cyber Security Intelligence Index, 95% of all security incidents involve human...

Implementing AWS IAM Best Practices is Your Responsibility

If you find yourself worried at night when you go to sleep whether you've properly secured your AWS IAM users or API...

Why Azure’s Moves Matter

Azure announced a series of new features and technologies that actually moved the needle in their battle to...

Cloud Services Killed the Server… Again

I've often stared deep into the eyes of a colleague when I mutter the words "services killed the server". Not because I...

AWS re:Covery 2014

As many of us are coming off our intravenous fluid regimens, toxic cleanses, and other common post-Vegas treaments, we...

The Sadistic SecOps Manager (or MFA on CLI)

As part of my job, I get to meet SecOps engineers or CSOs that "go the extra mile" when it comes to securing their...

Defending Against AWS Account Takeover Using ESP

Released last week, the fifth-annual Imperva "Web Application Attack Report" found one-fifth of all Web application...

Shared Responsibility, Not Absolved of Responsibility

In real-life, we share a lot of responsibilities. You take turns with your spouse dropping off or picking up the kids...

Cloudshocked — AWS Moves Quickly to Close Risk

In the realm of “move faster than the attacker”, AWS has taken precise action and notified a lot (we can assume ALL)...

What’s New in Evident Security Platform 1.02?

Thanks to our customers and their great feedback, Evident Security Platform (ESP) has seen some dramatic changes since...