Penetration Testing | KirkpatrickPrice

Carving Out Vulnerabilities Through Comparison

A Guessing Game Picture this – Halloween in the ’80s. A classroom full of students at their desks, staring at a large object hidden under a blanket. The guessing game had only just begun. Gasps filled the room as our teacher revealed a gigantic pumpkin. “If you guess how much it weighs, it’s yours!” Our […]

Cybersecurity at Work | KirkpatrickPrice

Cybersecurity at Work: Audits That Require Security Awareness Training

It is Cybersecurity Awareness Month! Every October we are reminded of the potential threats that are up against our cybersecurity. It is no surprise that employees make their way to the top of the vulnerability lists each year. It is time we created a culture of cybersecurity in the workplace. Employees are often an organization’s […]

What to Consider When Choosing Managed Cloud Security Services

What to Consider When Choosing Managed Cloud Security Services

Cloud platforms make it easier for businesses to leverage complex technologies. Instead of buying, configuring, and managing a physical server, you deploy an instance of a server in the cloud. Instead of licensing, installing, and updating enterprise software, you deploy software for the time and purpose that you need through your provider. Cloud platforms provide […]

How to Design Effective Security Compliance Programs

How to Design Effective Security Compliance Programs

Security compliance is a primary concern for data-driven, technology-empowered businesses. On the one hand, they face internal and external security threats ranging from ransomware and phishing attacks to malicious insiders and human error. On the other hand, regulatory frameworks such as HIPAA and the GDPR impose stringent security and privacy standards with legal and financial […]

How to Keep AWS Access Keys and Other Secrets Safe

How to Keep AWS Access Keys and Other Secrets Safe

Information security in the cloud depends on the proper management of secrets, including AWS access keys. Authorized users and code must authenticate to use cloud resources. Authentication relies on shared secrets, but shared credentials may create security vulnerabilities, especially when they are shared naively by embedding them in application code.  Embedding AWS access keys in […]