Carving Out Vulnerabilities Through Comparison

by Hannah Grace Holladay / February 13, 2023

A Guessing Game Picture this – Halloween in the ’80s. A classroom full of students at their desks, staring at a large object hidden under a blanket. The guessing game had only just begun. Gasps filled the room as our teacher revealed a gigantic pumpkin. “If you guess how much it weighs, it’s yours!” Our teacher was encouraging a creative lesson on estimation. The only thing keeping that pumpkin from…

Cybersecurity at Work: Audits That Require Security Awareness Training

by Amelia Lewis / June 15, 2023

It is Cybersecurity Awareness Month! Every October we are reminded of the potential threats that are up against our cybersecurity. It is no surprise that employees make their way to the top of the vulnerability lists each year. It is time we created a culture of cybersecurity in the workplace. Employees are often an organization’s weakest link. Whether it be the lack of funding or misunderstanding of cybersecurity best practices,…

What to Consider When Choosing Managed Cloud Security Services

by Hannah Grace Holladay / April 12, 2023

Cloud platforms make it easier for businesses to leverage complex technologies. Instead of buying, configuring, and managing a physical server, you deploy an instance of a server in the cloud. Instead of licensing, installing, and updating enterprise software, you deploy software for the time and purpose that you need through your provider. Cloud platforms provide many technical intricacies through a user interface, but sometimes how and what you should configure…

How to Design Effective Security Compliance Programs

by Hannah Grace Holladay / February 13, 2023

Security compliance is a primary concern for data-driven, technology-empowered businesses. On the one hand, they face internal and external security threats ranging from ransomware and phishing attacks to malicious insiders and human error. On the other hand, regulatory frameworks such as HIPAA and the GDPR impose stringent security and privacy standards with legal and financial penalties for non-compliance.  A security compliance program helps a business to own its compliance risks.…

AWS ECS vs AWS EKS: AWS Container Services Explained

by Hannah Grace Holladay / June 14, 2023

Containers are used to host code without the complexity and resource demands of virtual machines. They allow developers to combine code and dependencies into a standardized package that runs anywhere, making them the ideal foundation for cloud-native applications and microservices. But containers pose a problem. How do developers and DevOps professionals manage container creation, hosting, networking, and security? A business may deploy dozens of containers to host its apps and…