Homepage
Open in app
Sign in
Get started
Cloud Security
Cybersecurity in a Cloudy World
Cybersecurity for Executives
Woman in Cyber
Cloud Pentesting
Cloud Security Engineering
Cloud Breaches
Connecting to Clouds
Cybersecurity Books
2nd Sight Lab
Follow
Calculating the size of a TCP Packet Payload
Calculating the size of a TCP Packet Payload
Part of a series on Cybersecurity Math. Also, Network Security.
Teri Radichel
Mar 25
Calculating the Next Layer in a Packet
Calculating the Next Layer in a Packet
CM.6 Understanding which header follows the IP header in IPv4 or IPv6
Teri Radichel
Mar 24
Calculating Packet and IP Header Lengths
Calculating Packet and IP Header Lengths
CM.5 Digging into a packet header to decipher the field values
Teri Radichel
Mar 23
Math in Network Packets
Math in Network Packets
CM.5 Bits, bytes, and packet headers — starting with the ethernet header
Teri Radichel
Mar 21
Hexadecimal To Binary To Decimal
Hexadecimal To Binary To Decimal
CM4. Conversion without exponentials
Teri Radichel
Mar 20
Want to Talk to a Cybersecurity Expert?
Want to Talk to a Cybersecurity Expert?
Schedule a call with me or one of the other faculty members at IANS Research
Teri Radichel
Mar 20
Counting in Hexadecimal (Base 16)
Counting in Hexadecimal (Base 16)
CM.3 When the numbers run out, use letters
Teri Radichel
Mar 19
Close an AWS Account in an Organization
Close an AWS Account in an Organization
ACM.168 Challenges and risks related to removing AWS accounts, OUs, and organizations
Teri Radichel
Feb 25
The SANS GSE
The SANS GSE
What’s it like to take one of the hardest cybersecurity certifications in the industry — and pass!
Teri Radichel
Jun 7, 2019
AWS Resources Organization and Naming Conventions
AWS Resources Organization and Naming Conventions
ACM.40 Organizing AWS resources to find resources, reduce errors, plan for growth, and handle security incidents more efficiently
Teri Radichel
Sep 3, 2022
AWS Lambda and Batch jobs for Steps in a Process
AWS Lambda and Batch jobs for Steps in a Process
ACM.39 Serverless components to construct secure architectures
Teri Radichel
Aug 24, 2022
Proposal: Revisions for CIS Controls #1 and #2
Proposal: Revisions for CIS Controls #1 and #2
ACM.178 Will lack of inventory or known vulnerabilities be more likely to facilitate a data breach?
Teri Radichel
Mar 8
Cybersecurity Math
Cybersecurity Math
CM.1 How you can use math to reconcile cybersecurity
Teri Radichel
Mar 16
Network Protocols and Firewall Rules
Network Protocols and Firewall Rules
Pondering TCP handshakes and unnecessary network traffic
Teri Radichel
Sep 27, 2021
Securing Secrets Used By Your Code
Securing Secrets Used By Your Code
How many chances do you give attackers to steal your secrets?
Teri Radichel
Feb 8, 2022
Creating an Organizational Unit (OU) and Service Control Policies (SCPs) with CloudFormation
Creating an Organizational Unit (OU) and Service Control Policies (SCPs) with CloudFormation
ACM.171 Recreating our OUs and SCPs with CloudFormation
Teri Radichel
Feb 28
Okta SAML Integration with AWS IAM Step 3: Creating SAML Roles
Okta SAML Integration with AWS IAM Step 3: Creating SAML Roles
ACM.174 Determining permissions for an AWS Billing Administrator Role
Teri Radichel
Mar 3
Okta
Okta
Stories related to Okta by Teri Radichel
Teri Radichel
Feb 24
Create an AWS Account with CloudFormation
Create an AWS Account with CloudFormation
ACM.178 Deploy an IAM, Billing, and Governance account in a Governance OU
Teri Radichel
Mar 7
Defining AWS Accounts and Organizational Units
Defining AWS Accounts and Organizational Units
ACM.180 Defining accounts and organizational units based on by trust boundaries and roles to protect critical assets
Teri Radichel
Mar 14
Cybersecurity Book Review: How to Measure Anything in Cybersecurity Risk
Cybersecurity Book Review: How to Measure Anything in Cybersecurity Risk
ACM.1 You cannot manage what you cannot measure
Teri Radichel
Jul 17, 2022
Lambda Networking
Lambda Networking
ACM.50 Considering when to apply or not apply VPC networking to a Lambda function
Teri Radichel
Sep 14, 2022
Amazon DocumentDB Network Access — Why the VPC?
Amazon DocumentDB Network Access — Why the VPC?
Billions of Reasons why networking is vital for cloud security courtesy of MongoDB
Teri Radichel
Sep 1, 2019
Keeping VMs on Private Networks on Azure, AWS, and GCP
Keeping VMs on Private Networks on Azure, AWS, and GCP
Nuances in multi-cloud networking and how it could contribute to cloud data breaches and security incidents
Teri Radichel
Dec 8, 2022
Cloud Security Architecture — Batch Jobs
Cloud Security Architecture — Batch Jobs
ACM.49 Cloud security and application architecture for running batch jobs
Teri Radichel
Sep 13, 2022
SASE: Secure Access Service Edge
SASE: Secure Access Service Edge
Distributed security architectures in the cloud.
Teri Radichel
Oct 26, 2020
Should We Apply Statistics to Cybersecurity Risk Decisions?
Should We Apply Statistics to Cybersecurity Risk Decisions?
Considering different methods of risk analysis and decision-making
Teri Radichel
Jul 20, 2022
Exponential increases in cyber risk from Internet exposure
Exponential increases in cyber risk from Internet exposure
If you think about how breaches occur there is almost always some sort of Internet exposure involved. How many of your systems are exposed?
Teri Radichel
May 24, 2019
Mechanisms of Authenticating to a Linux VM (EC2 Instance) on AWS
Mechanisms of Authenticating to a Linux VM (EC2 Instance) on AWS
ACM.77 Considerations for how you access virtual machines in a cloud environment
Teri Radichel
Oct 11, 2022
Do You Know Your OAuth Flows?
Do You Know Your OAuth Flows?
Choose the correct flow for the application you’re building
Teri Radichel
Mar 23, 2021
Security for Startups
Security for Startups
Limited resources and new to security — where do I start?
Teri Radichel
Aug 10, 2020
Refactoring Existing Code to Use IAM Naming Conventions: Part 2
Refactoring Existing Code to Use IAM Naming Conventions: Part 2
ACM.43 Simplifying User and Group creation with reusable templates and functions
Teri Radichel
Sep 6, 2022
About Cloud Security
Latest Stories
Archive
About Medium
Terms
Privacy