by ray | Aug 2, 2019 | Security, Tech News
Buh-bye, Facebook. It’s been real. So you’ve had it with endless scrolling through the News Feed, notifications that wake you up in the middle of the night, memories that remind you how little your life has changed over the years, and groups that are...
by ray | Aug 2, 2019 | Security, Tech News
IBM took nearly a million photos from Flickr, used them to figure out how to train facial recognition programs, and shared them with outside researchers. But as NBC points out, the people photographed on Flickr didn’t consent to having their photos used to...
by ray | Jul 19, 2019 | Tech News, Security
Most technology enthusiasts have probably heard the term VPN. It’s especially thrown around the enterprise IT world. In fact, “per app VPN” is one of the key enterprise features of iOS 7. So what exactly is VPN? VPN stands for Virtual Private Network. In...
by ray | Jul 18, 2019 | Amazon Web Services (AWS), Amazon, ITAR, Security, Tech News
AWS Config rules give you the power to perform Dynamic Compliance Checking on your Cloud Resources. Building on the AWS Resource Configuration Tracking provided by AWS Config, you can use a combination of predefined and custom rules to continuously...
by ray | Jul 18, 2019 | Amazon Web Services (AWS), Amazon, ITAR, Security, Tech News
Earlier this month I met with an enterprise-scale AWS customer. They told me that they are planning to go all-in on AWS, and want to benefit from all that we have learned about setting up and running AWS at scale. In addition to setting up a Cloud Center of...
by ray | Jul 18, 2019 | Amazon Web Services (AWS), Amazon, ITAR, Security, Tech News
I’m a developer, or at least that’s what I tell myself while coming to terms with being a manager. I’m definitely not an infosec expert. I’ve been paged more than once in my career because something I wrote or configured caused a security concern. When systems enable...