fbpx

How quickly you react to security incidents is paramount to minimizing their impacts. Automating incident reaction can help you scale your features, decrease the scope of compromised sources rapidly, and reduce repetitive function by security teams. However when you make use of automation, you need to manage exceptions to standard response procedures also. In this […]

Read more

As institutions grow, they often times experience an inflection stage where it becomes impractical to manually manage individual user accounts within disparate systems. Managing several AWS accounts is not any exception. Many big organizations possess dozens or a huge selection of AWS accounts spread across several business units even. AWS provides many options that may […]

Read more

AWS Cryptography has completed benchmarks of Round 2 Versions of the Bit Flipping Key Encapsulation (BIKE) and Supersingular Isogeny Key Encapsulation (SIKE) hybrid post-quantum Transport Layer Security (TLS) Algorithms. Both of these algorithms have been submitted to the National Institute of Standards and Technology (NIST) as part of NIST’s Post-Quantum Cryptography standardization process. In the […]

Read more

Digital certificates, also known as X.509 or TLS/SSL certificates, are used to prove the identity of entities like web servers or VPN users and to establish secure communication channels between them. In this blog post, I’ll discuss certificate extensions. You can use certificate extensions for applications beyond the common use case of identifying TLS server […]

Read more