Carving Out Vulnerabilities Through Comparison

by Hannah Grace Holladay / October 31st, 2021

A Guessing Game Picture this – Halloween in the ’80s. A classroom full of students at their desks, staring at a large object hidden…

How to Design Effective Security Compliance Programs

by Hannah Grace Holladay / October 2nd, 2021

Security compliance is a primary concern for data-driven, technology-empowered businesses. On the one hand, they face internal and external security threats ranging from ransomware…

AWS ECS vs AWS EKS: AWS Container Services Explained

by Hannah Grace Holladay / September 22nd, 2021

Containers are used to host code without the complexity and resource demands of virtual machines. They allow developers to combine code and dependencies into…

The Top 5 AWS Security Mistakes To Avoid

by Hannah Grace Holladay / August 25th, 2021

AWS’s compute and data storage services are the beating heart of tens of thousands of businesses. That makes AWS security and compliance a matter…