FBI issues cybersecurity advisory on Windows RDP access

The Federal Bureau of Investigation (FBI) and Department of Homeland Security (DHS) issued an advisory on Remote Desktop Protocol (RDP) access related threats.

Monitoring AWS Cloud with Splunk using AWS CloudWatch

Continuous monitoring is critical to meeting HIPAA, FedRAMP, FISMA or NIST CSF

Plugging the “ops” gap left by DevOps

DevOps is designed to automate the build deployment and integration process using CI/CD

Webinar – Securing and Monitoring your AWS Cloud with Splunk

Implementing a strong continuous monitoring program is critical for meeting security and compliance requirements.

Webinar – Vulnerability Management and Penetration Testing on AWS Cloud

Please register for Vulnerability Management and Penetration Testing on AWS Cloud on Aug 15, 2018

Vulnerability Assessment and Penetration Testing in AWS for SOC 2 Compliance

SaaS providers are increasingly going for SOC-2 compliance to demonstrate strong security controls that have been audited by a third-party.

Protecting against a Distributed Denial of Service (DDOS) attack using AWS

Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are happening at an increasing frequency impacting public-facing web applications.

stackArmor ThreatAlert Top 4 AWS Security Group Misconfigurations

AWS Security Groups are foundational to security providing baseline building blocks in any AWS cloud deployment. Security Groups are cloud firewalls designed to protect applications

Continuous Compliance and Security – Going beyond logging and monitoring…

In the constantly evolving cybersecurity market where new threats present themselves every day, it can be a daunting task to maintain proper security.