Tag: CIS

Building Secure S3 Buckets

How to Build A Secure S3 Bucket?

A few days ago, I searched for data breaches and leaks due to insecure S3 buckets on Google. Needless to say, I was blown away by the number of high-profile names on that list. Companies like FedEx, Verizon, Accenture, and even government organizations like the Pentagon. So in this article, ...

Reading Continue
What is Multi-Factor Authentication

What is Multi-Factor Authentication?

Most organizations require their employees to use multi-factor authentication (MFA) solutions these days. This is because your traditional passwords are not secure anymore. Think of this, between your sensitive data and a hacker, the first and only line of defense is your password. Over the years, hackers have become steadfast ...

Reading Continue
A Complete List of AWS S3 Misconfigurations

A Complete List of AWS S3 Misconfigurations

Amazon S3 or Amazon Simple Storage Service is an AWS service where data and objects are stored. It is the most popular public cloud service that offers data availability, security, and performance. Both small and large businesses use this service. Unfortunately, AWS S3 bucket misconfigurations are one of the most ...

Reading Continue
Top-6-Azure-Virtual-Machine-(VM)-Misconfigurations-To-Avoid

Top 6 Azure Virtual Machine (VM) Misconfigurations To Avoid in 2021

This article will explore the top 6 most common Azure Virtual Machine (VM) misconfigurations you need to avoid in 2021.  What are Azure Virtual Machines? Azure offers many on-demand, scalable computing resources. Azure Virtual Machines (VM) is one of them. When you need more control over the computing environment, you ...

Reading Continue
scott graham 5fNmWej4tAA unsplash 1

A Definitive List Of Various Compliance Standards And What They Mean

Cyberattacks have been very prominent in the last decade. Just last week, social media giant Twitter fell prey to it wherein accounts of prominent personalities, like Elon Musk, Bill Gates, former U.S. President Barack Obama, and others were hacked. While we cannot stop these attacks completely, there are certain rules and regulations ...

Reading Continue