Prevent Phishing In The Cloud: Tips For Your Organization

Prevent Phishing In The Cloud

Prevent Phishing In The Cloud: Tips For Your Organization Introduction The term “phishing” describes a type of cyberattack in which criminals try to trick people into providing sensitive information, such as login credentials or financial data. Phishing attacks can be very difficult to detect, because they often look like legitimate communications from trusted sources. Phishing […]

Cloud Security Threats In 2022

cloud security threats in 2022

Cloud Security Threats In 2022 As we move through 2022, it’s important to be aware of the top cloud security threats that may impact your organization. In 2022, cloud security threats will continue to evolve and become more sophisticated.   Here is a list of things to consider in 2022: 1. Hardening Your Infrastructure One […]

What Does An AWS Cloud Security Engineer Do?

What Does An AWS Cloud Security Engineer Do

What Does An AWS Cloud Security Engineer Do? What Type Of Person Is Fit For A Job In Security Engineering? There’s a lot of romanticism around doing engineering work. Maybe it’s because security engineers have to do technical problem solving, and they have to be very persistent and intuitive thinking. You’re going to have to […]

What Is Penetration Testing?

What Is Penetration Testing

What Is Penetration Testing? So, What Is Penetration Testing? Penetration testing is the process of finding and fixing security vulnerabilities in an organization. Part of the pen testers process is to create reports that show threat intelligence and help navigate organizational cybersecurity strategy. Pen testers take on the role of offensive security (blue team) and […]

AWS Penetration Testing

AWS Penetration Test

AWS Penetration Testing What is AWS Penetration Testing? Penetration testing methods and policies differ based on the organization that you’re in. Some organizations allow more freedoms while others have more protocols built in.  When you are doing pen testing in AWS, you have to work within the policies that AWS allows you to because they […]

5 Signs You’re Dealing with a Catfishing Attempt: What is Catfishing?

5 Signs You're Dealing with a Catfishing Attempt: What is Catfishing?

Deploy GoPhish Phishing Platform on Ubuntu 18.04 into AWS Have you ever been contacted by someone online that seemed too good to be true? They might have been catfishing you. Catfishing is a type of social engineering attack where the attacker tries to create a relationship with their victim in order to gain trust. Often, […]