Stackarmour

Blog

Step 2: Conducting a Security and Threat Assessment for AWS | stackArmor “Security by Design“

Establishing a strong cybersecurity and compliance program is critical to ensuring the confidentiality

FedRAMP Accredited Landing Zone for Government Contractors

Private sector firms and organizations doing business with the US Department of Defense

FBI issues cybersecurity advisory on Windows RDP access

The Federal Bureau of Investigation (FBI) and Department of Homeland Security (DHS) issued an advisory on Remote Desktop Protocol (RDP) access related threats.

Monitoring AWS Cloud with Splunk using AWS CloudWatch

Continuous monitoring is critical to meeting HIPAA, FedRAMP, FISMA or NIST CSF

Plugging the “ops” gap left by DevOps

DevOps is designed to automate the build deployment and integration process using CI/CD

Webinar – Securing and Monitoring your AWS Cloud with Splunk

Implementing a strong continuous monitoring program is critical for meeting security and compliance requirements.

Webinar – Vulnerability Management and Penetration Testing on AWS Cloud

Please register for Vulnerability Management and Penetration Testing on AWS Cloud on Aug 15, 2018

Vulnerability Assessment and Penetration Testing in AWS for SOC 2 Compliance

SaaS providers are increasingly going for SOC-2 compliance to demonstrate strong security controls that have been audited by a third-party.

Protecting against a Distributed Denial of Service (DDOS) attack using AWS

Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are happening at an increasing frequency impacting public-facing web applications.

1 2 3 8