Home
Blog
About
Security
❄️ Snowflake Safe. The Importance of SaaS Governance
06 June 2024
Don't get stung!🐝 A Peek Into Emerging Risks In AI Technologies and Organizational Strategies For Mitigation.
03 June 2024
Breaking Down the NSA’s Guidance on Zero Trust Implementations for the Applications and Workloads Pillar
03 June 2024
When Zero Trust Makes Zero Sense
31 May 2024
Top 5 Reasons CMS's SEAS IT AI Contract Is One to Watch
28 May 2024
Do you have Container Base Image CVEs? Switch to Alpine Linux to reduce CVEs!
24 May 2024
Uncle Sam Wants YOU (To Learn To Code) – And He’s Got An Apprenticeship Program For It
22 May 2024
Can Collaboration with Enterprise Tech Solve the Federal Zero Trust Problem
02 May 2024
Recap of the 2024 Cloud Compliance Summit
04 April 2024
How I Passed the New CSA Certificate of Competence in Zero Trust (CCZT) Exam, and Why You Should Take It Too
26 March 2024
Exploring the GitHub Advisory Database for fun and (no) profit
26 February 2024
Has Your SaaS Gotten Sassy? Know When Your SaaS-to-SaaS Interconnections Have Gotten Too Loquacious.
23 February 2024
Who Dropped the SBOM 💣? How to Size-Up Tooling in an Inchoate Space.
02 February 2024
Cybersecurity Meets Pareto - The Three A's (AAA)
05 January 2024
I Sat for the CISSP Exam. I Passed. Here's How.
11 December 2023
The Top 4 SaaS Security Challenges and How To Overcome Them
07 December 2023
AWS ReInvent and PreInvent security recap
03 December 2023
Driving Actionable Work From a Threat Model
13 November 2023
Breaking Down the Modernizing FedRAMP Memo
30 October 2023
From Apprentice to Advocate - My Journey at Uniting Women in Cyber Conference
19 October 2023
Announcing the Amazon GuardDuty Runbook Generator
31 August 2023
Aquia Open Source Contributions - Adding a CISA KEV Enrichment Table to Matano
30 July 2023
How to Sign Container Images Using Cosign
25 April 2023
Signing Software Artifacts With Cosign
25 April 2023
Resiliency, Cyber Risk, and Injury Prevention
20 March 2023
“So, You’re Building a Purple Team?”
22 February 2023
The Benefits Of Using SaaS Security Posture Management (SSPM)
08 February 2023
Introducing KEV Bot, Our Known Exploited Vulnerabilities Bot
11 January 2023
Taking The New Secrets Manager Lambda Extension For a Spin
01 January 2023
The Importance of Internal Cloud Security Standards
21 December 2022
AWS Re:Invent 2022 Security Recap and Top 5 Releases
04 December 2022
Exploit Prediction Scoring System (EPSS)
20 October 2022
OWASP Software Component Verification Standard (SCVS)
04 October 2022
An Incomplete Look at Vulnerability Databases & Scoring Methodologies
29 August 2022
Auto Remediation with Eventbridge, Step Functions, and the AWS SDK Integration
11 March 2022
Supply Chain Risk Management
06 March 2022
Using Semgrep to find security issues and misconfigurations in AWS Cloud Development Kit projects
18 February 2022
Securing the Digital Transformation
11 February 2022
Hello World
04 February 2022