According to Redlock, cryptojacking, account compromises, and a lack of high-severity patching are all making the outlook on using AWS potentially one of higher risk. Too many companies seem to be forgetting that security must extend to the cloud to guarantee that their data will be safe. This means moving the focus of many security […]
Read MoreDevOps has been the hot new job market over the last few years – and rightly so. If implemented, it can reduce time to market, cost of implementation, and make an entire organization more Agile (see what we did there?). This is all well and good, but what about security? Containers open a host of […]
Read MoreMost organizations looking to make the move into a cloud environment will find that some of their applications and services will not migrate easily – or at all. With this in mind, White Raven rarely will suggest that a customer standardize on a single cloud provider, or to ignore the benefits of self-hosted solutions altogether. […]
Read MoreToo often, we at White Raven have spoken to our peers in the industry who have complained about the sticker shock of moving to the cloud. Matthew Shooshtari has written an article discussing this phenomenon, and we wanted to expand ever so slightly on it. As a long-term infrastructure manager, it bears (in my opinion) […]
Read MoreAs new developments unfold in the Spectre saga – it appears that Intel shared the news about the vulnerability with Chinese interests before those in the USA – this could mean that threat actors in that region were able to react before we even knew about it. Regardless of the legal and international ramifications, White […]
Read MoreSpectre and Meltdown are major vulnerabilities, ones that could have very far-reaching implications. As Intel and the other chip manufacturers are figuring out exactly what to do about the loss of performance on their chips, the major providers of operating systems have all released guidance on how to best approach the problem. For now, the […]
Read MoreGreat article here on supply-chain attacks. Many people assume that using the “big boys” in our industry makes them safe – but even they have their flaws. Encryption and proper security measures should be taken to protect the data itself, as all infrastructures have flaws in their design: https://www.darkreading.com/cloud/understanding-supply-chain-cyber-attacks/a/d-id/1330808
Read More