Entries by Jenna Kersten

Best Practices for Configuring Your AWS Perimeter

Could what happened at Capital One happen at your organization? As a business owner, stakeholder, or IT personnel, that’s the unavoidable fear that appears when you hear about the latest data breach. The Capital One data breach is one of the most damaging data breaches of 2019, and we’ll continue to learn about the repercussions […]

AWS Security for S3 and EC2

Best Practices for AWS Security AWS brings new opportunities for businesses to innovate, build, and grow – but what about the data in the cloud? Is it protected? How likely is it to be compromised? The 2019 Cloud Adoption and Risk Report from McAfee reports that the sharing of sensitive data in the cloud is […]

What is Continuous Penetration Testing?

Applications change. Systems change. Networks change. Employees change. Hackers change. What happens when you alter your environment in any way? A web application that was stable yesterday may not be with the next update. So, why wouldn’t you engage in continuous penetration testing?

What is IoT Penetration Testing?

Internet of things (IoT) technology is making daily tasks easier, but how secure is this technology? It’s your job as the developer of IoT technology to make sure that the information transmitted through these devices is secure so that the consumer doesn’t have to worry.