In light of the recent Uber data breach, I thought it would be a good time to review common techniques used to properly secure sensitive information. The steps below are...
Send Attackers Phishing Somewhere Else
by Brad Wise | Mar 30, 2020 | Security
Send Attackers Phishing Somewhere Else About two and a half years ago, I heard a keynote by Eleanor Saitta where she asked the question “How fast can you burn out a...
AWS Cloud Security Best Practices – Part 2 of 2
by Peter Roosakos | Jan 28, 2020 | Amazon Web Services, AWS, Security
Securing Your AWS Infrastructure In Part 1 of this AWS Cloud Security Best Practices series we gave an overview of Foghorn’s best practices for building and maintaining...
AWS Cloud Security Best Practices – Part 1 of 2
by Peter Roosakos | Jan 13, 2020 | Amazon Web Services, AWS, Security
Spend on Cloud Security Will Double As use of the public cloud grows so do investments in protecting those assets. According to Forrester’s report, “Cloud Security...
Systems Hardening Using the CIS Benchmarks & Ansible
by Sara Tumbarella | Oct 2, 2019 | AWS, Azure, GCP, Security
In my previous post, we discussed the CIS Benchmarks and system hardening. If you missed it, please check it out here so you can follow along. If you are familiar with the...
Using DevOps Principles to Enhance Diversity in Tech
by Kevin Fleming | Aug 14, 2019 | Cloud, Cloud Management, Security
Alston Rousseau is a Senior Cloud Consultant for Foghorn Consulting. With the soaring need for cloud engineering talent, enterprises are encouraging more and more people,...
SUBSCRIBE TO OUR BLOG
