Homepage
Open in app
Sign inGet started

Cloud Security

Cybersecurity in a Cloudy World

  • Cybersecurity for Executives
  • Woman in Cyber
  • Cloud Pentesting
  • Cloud Security Engineering
  • Cloud Breaches
  • Connecting to Clouds
  • Cybersecurity Books
  • 2nd Sight Lab
  • Calculating the size of a TCP Packet Payload

    Calculating the size of a TCP Packet Payload

    Part of a series on Cybersecurity Math. Also, Network Security.
    Go to the profile of Teri Radichel
    Teri Radichel
    Mar 25
    Calculating the Next Layer in a Packet

    Calculating the Next Layer in a Packet

    CM.6 Understanding which header follows the IP header in IPv4 or IPv6
    Go to the profile of Teri Radichel
    Teri Radichel
    Mar 24
    Calculating Packet and IP Header Lengths

    Calculating Packet and IP Header Lengths

    CM.5 Digging into a packet header to decipher the field values
    Go to the profile of Teri Radichel
    Teri Radichel
    Mar 23
    Math in Network Packets

    Math in Network Packets

    CM.5 Bits, bytes, and packet headers — starting with the ethernet header
    Go to the profile of Teri Radichel
    Teri Radichel
    Mar 21
    Hexadecimal To Binary To Decimal

    Hexadecimal To Binary To Decimal

    CM4. Conversion without exponentials
    Go to the profile of Teri Radichel
    Teri Radichel
    Mar 20
    Want to Talk to a Cybersecurity Expert?

    Want to Talk to a Cybersecurity Expert?

    Schedule a call with me or one of the other faculty members at IANS Research
    Go to the profile of Teri Radichel
    Teri Radichel
    Mar 20
    Counting in Hexadecimal (Base 16)

    Counting in Hexadecimal (Base 16)

    CM.3 When the numbers run out, use letters
    Go to the profile of Teri Radichel
    Teri Radichel
    Mar 19
    Close an AWS Account in an Organization

    Close an AWS Account in an Organization

    ACM.168 Challenges and risks related to removing AWS accounts, OUs, and organizations
    Go to the profile of Teri Radichel
    Teri Radichel
    Feb 25
    The SANS GSE

    The SANS GSE

    What’s it like to take one of the hardest cybersecurity certifications in the industry — and pass!
    Go to the profile of Teri Radichel
    Teri Radichel
    Jun 7, 2019
    AWS Resources Organization and Naming Conventions

    AWS Resources Organization and Naming Conventions

    ACM.40 Organizing AWS resources to find resources, reduce errors, plan for growth, and handle security incidents more efficiently
    Go to the profile of Teri Radichel
    Teri Radichel
    Sep 3, 2022
    AWS Lambda and Batch jobs for Steps in a Process

    AWS Lambda and Batch jobs for Steps in a Process

    ACM.39 Serverless components to construct secure architectures
    Go to the profile of Teri Radichel
    Teri Radichel
    Aug 24, 2022
    Proposal: Revisions for CIS Controls #1 and #2

    Proposal: Revisions for CIS Controls #1 and #2

    ACM.178 Will lack of inventory or known vulnerabilities be more likely to facilitate a data breach?
    Go to the profile of Teri Radichel
    Teri Radichel
    Mar 8
    Cybersecurity Math

    Cybersecurity Math

    CM.1 How you can use math to reconcile cybersecurity
    Go to the profile of Teri Radichel
    Teri Radichel
    Mar 16
    Network Protocols and Firewall Rules

    Network Protocols and Firewall Rules

    Pondering TCP handshakes and unnecessary network traffic
    Go to the profile of Teri Radichel
    Teri Radichel
    Sep 27, 2021
    Securing Secrets Used By Your Code

    Securing Secrets Used By Your Code

    How many chances do you give attackers to steal your secrets?
    Go to the profile of Teri Radichel
    Teri Radichel
    Feb 8, 2022
    Creating an Organizational Unit (OU) and Service Control Policies (SCPs) with CloudFormation

    Creating an Organizational Unit (OU) and Service Control Policies (SCPs) with CloudFormation

    ACM.171 Recreating our OUs and SCPs with CloudFormation
    Go to the profile of Teri Radichel
    Teri Radichel
    Feb 28
    Okta SAML Integration with AWS IAM Step 3: Creating SAML Roles

    Okta SAML Integration with AWS IAM Step 3: Creating SAML Roles

    ACM.174 Determining permissions for an AWS Billing Administrator Role
    Go to the profile of Teri Radichel
    Teri Radichel
    Mar 3
    Okta

    Okta

    Stories related to Okta by Teri Radichel
    Go to the profile of Teri Radichel
    Teri Radichel
    Feb 24
    Create an AWS Account with CloudFormation

    Create an AWS Account with CloudFormation

    ACM.178 Deploy an IAM, Billing, and Governance account in a Governance OU
    Go to the profile of Teri Radichel
    Teri Radichel
    Mar 7
    Defining AWS Accounts and Organizational Units

    Defining AWS Accounts and Organizational Units

    ACM.180 Defining accounts and organizational units based on by trust boundaries and roles to protect critical assets
    Go to the profile of Teri Radichel
    Teri Radichel
    Mar 14
    Cybersecurity Book Review: How to Measure Anything in Cybersecurity Risk

    Cybersecurity Book Review: How to Measure Anything in Cybersecurity Risk

    ACM.1 You cannot manage what you cannot measure
    Go to the profile of Teri Radichel
    Teri Radichel
    Jul 17, 2022
    Lambda Networking

    Lambda Networking

    ACM.50 Considering when to apply or not apply VPC networking to a Lambda function
    Go to the profile of Teri Radichel
    Teri Radichel
    Sep 14, 2022
    Amazon DocumentDB Network Access — Why the VPC?

    Amazon DocumentDB Network Access — Why the VPC?

    Billions of Reasons why networking is vital for cloud security courtesy of MongoDB
    Go to the profile of Teri Radichel
    Teri Radichel
    Sep 1, 2019
    Keeping VMs on Private Networks on Azure, AWS, and GCP

    Keeping VMs on Private Networks on Azure, AWS, and GCP

    Nuances in multi-cloud networking and how it could contribute to cloud data breaches and security incidents
    Go to the profile of Teri Radichel
    Teri Radichel
    Dec 8, 2022
    Cloud Security Architecture — Batch Jobs

    Cloud Security Architecture — Batch Jobs

    ACM.49 Cloud security and application architecture for running batch jobs
    Go to the profile of Teri Radichel
    Teri Radichel
    Sep 13, 2022
    SASE: Secure Access Service Edge

    SASE: Secure Access Service Edge

    Distributed security architectures in the cloud.
    Go to the profile of Teri Radichel
    Teri Radichel
    Oct 26, 2020
    Should We Apply Statistics to Cybersecurity Risk Decisions?

    Should We Apply Statistics to Cybersecurity Risk Decisions?

    Considering different methods of risk analysis and decision-making
    Go to the profile of Teri Radichel
    Teri Radichel
    Jul 20, 2022
    Exponential increases in cyber risk from Internet exposure

    Exponential increases in cyber risk from Internet exposure

    If you think about how breaches occur there is almost always some sort of Internet exposure involved. How many of your systems are exposed?
    Go to the profile of Teri Radichel
    Teri Radichel
    May 24, 2019
    Mechanisms of Authenticating to a Linux VM (EC2 Instance) on AWS

    Mechanisms of Authenticating to a Linux VM (EC2 Instance) on AWS

    ACM.77 Considerations for how you access virtual machines in a cloud environment
    Go to the profile of Teri Radichel
    Teri Radichel
    Oct 11, 2022
    Do You Know Your OAuth Flows?

    Do You Know Your OAuth Flows?

    Choose the correct flow for the application you’re building
    Go to the profile of Teri Radichel
    Teri Radichel
    Mar 23, 2021
    Security for Startups

    Security for Startups

    Limited resources and new to security — where do I start?
    Go to the profile of Teri Radichel
    Teri Radichel
    Aug 10, 2020
    Refactoring Existing Code to Use IAM Naming Conventions: Part 2

    Refactoring Existing Code to Use IAM Naming Conventions: Part 2

    ACM.43 Simplifying User and Group creation with reusable templates and functions
    Go to the profile of Teri Radichel
    Teri Radichel
    Sep 6, 2022
    About Cloud SecurityLatest StoriesArchiveAbout MediumTermsPrivacy