PinnedSat GinVersion 1Clouds Cast Big Shadows: Shadow IT in the CloudThere is strong shadow where there is much light. — Wolfgang GoetheMar 16, 20221Mar 16, 20221
Sat GinVersion 1A Conversation with Ben, The Heart of BloggingI turned the tables on the awe-inspiring Ben Howarth. Ben heads up the Version 1 Cloud content creation initiative, “1Insight” to share…Dec 4, 2023Dec 4, 2023
Sat GWhy You Should Be Introducing DevSecOps to Your OrganizationThanks to those that attended my talk at the ISC2 Congress 2021. Here are the slides I used and check out my talk on DevSecOps over on the…Oct 28, 20211Oct 28, 20211
Sat GinVersion 1I already have monitoring in place, why do I need a SIEM?With the sharp rise of cyber attacks, the monitoring of security attacks or events has never been more important. Organisations need to…May 21, 20211May 21, 20211
Sat GinVersion 110 Classic Tools That Can Penetrate Your NetworkPenetration tests are a critical part of securing your technological estate. They simulate what a malicious actor would carry out when…Apr 8, 2021Apr 8, 2021
Sat GinVersion 1Why Are There So Many Data Breaches?Some of the largest organisations across the globe have been in the news for having their data stolen by hackers. One of the most common…Oct 19, 2020Oct 19, 2020
Sat GinVersion 1Why You Shouldn’t Always Follow Hardening GuidelinesHardening is the process of removing the unnecessary services and configuration and adding a secure framework to resources so that the…Sep 11, 2020Sep 11, 2020
Sat GinVersion 1Help! I’m under a DDoS attackIf you are asking for help, it means you have not planned for being under DDoS attack. You should have. Distributed Denial of Service…Aug 20, 20202Aug 20, 20202
Sat GinVersion 1Protecting Your Serverless SolutionIn recent years, the growth of Serverless has been monumental. More and more organisations are realising the benefits of the technology of…Jul 20, 2020Jul 20, 2020
Sat GinVersion 1VPNs have been killed by Identify-Aware ProxiesVirtual Private Networks (VPNs) have been around for decades providing secure networks and encryption in transit to compute services. The…Jun 1, 2020Jun 1, 2020