In the News: ADAPTURE and The Centrics Group Announce MergerRead More

Close

AWS Vulnerability Management: Are You Secure?

AWS provides in-line security tools to kickstart the process of securing your environments. But these pre-built security tools alone are not enough to protect you from current (and future) threat landscapes. You need to implement and optimize the right components and configurations to mitigate vulnerabilities. Consider the following best practices for maintaining security in AWS. [...]

Creating DDoS Resiliency in AWS

The average number of Distributed Denial of Service (DDoS) attacks doubled from January 2017 to January 2018. Not only are DDoS attacks growing in frequency, but they are also becoming more complex due to lack of security for IoT connected devices and recent Memcached software exploits. Are you secure in your DDoS resiliency in AWS? [...]