Amazon Web Services – don’t do API keys input into an EC2 instance

API keys = API Key + API Secret Key Never enter your IAM API keys into your EC2 instance. Unless you are the single user in that EC2 instance. If not, it’s like not doing yourself a favor, on the contrary. Some words briefly about the definition of what is an EC2 instance: EC2 instanceContinue reading “Amazon Web Services – don’t do API keys input into an EC2 instance”

Information Security Monitoring for companies rendering essential services is going to be closely watched by Romanian State

Deadline to submit the file to Romanian relevant authority is 17 December 2020. It’s for companies in the industries offering essential services (mainly energy utilities, banking, payments services, etc) Legal background: Law 362/2018 Why deadline is 17 December 2020? Because all related legal acts / governmental orders and so on have been culminated with HGContinue reading “Information Security Monitoring for companies rendering essential services is going to be closely watched by Romanian State”

VPNs and Work From Home: Security under scrutiny in times of COVID-19

VPNs secures communication between company servers and employees’ devices, but end user devices are exposed if not secured enough. Also, other compensating measures need to be in place. Courtesy of The Cyber Security Hub™ (TCSH), I would like to depict a link that TCSH had pointing to, citing that Work From Home(WFH) using VPN isContinue reading “VPNs and Work From Home: Security under scrutiny in times of COVID-19”

Ransomware mitigation with backups. It might work well for small or medium companies that cannot afford huge budgets for securing their systems

Provided that certain conditions are met In a previous page I wrote about the balance that always has to be reached between costs in risks, including cyberattacks. So, I have expressed the opinion that there is no point in spending too much on some fancy security tool that covers a risk that, if occurred, itContinue reading “Ransomware mitigation with backups. It might work well for small or medium companies that cannot afford huge budgets for securing their systems”

Snyk – 1 billion (possible) valuation

Their model Snyk innovation is to fit security in the development process. In any development software company, during their development process, a separate security team takes the code offline and reviews it checking vulnerabilities in code (non necessarily aiming to find bugs). For example, they look into code and detect risks and recommends protecting againstContinue reading “Snyk – 1 billion (possible) valuation”