Author: CloudSEK

Read our latest blog posts

How to build a secure AWS infrastructure

Summary of the recommendations of AWS' Well-Architected Framework, with respect to design, delivery, and maintenance of secure...

Continue reading

Combating data breaches caused by misconfigured apps

There has been a precipitous rise in the number of COVID-themed data breaches. Here are security practices...

Continue reading

How do threat actors discover and exploit vulnerabilities in the wild?

Attackers use a variety of tools and techniques to discover and exploit security vulnerabilities in widely used...

Continue reading