Sign up for our newsletter! →

HanByte

Blog

hanabyte blog by Otis Thrasher on AI and ML with AWS
Cloud Security

With Great AI Comes Great Responsibility

AI is here to stay. There is no avoiding it; however, there are revolutionary advancements that can be made by leveraging AI to create, automate, and streamline mundane processes with security best practices.

Read More →
Michael Greenlaw HanaByte blog on AFT to ATO
Automation

From AFT to ATO: The Prequel

The purpose of this installment was originally to continue our journey; however, I was fortunate enough to speak on this topic in-depth at HashiTalks. Due to its technical nature, we thought it better to complete the blog series by taking a step back and providing a discussion about what the tool is, the problems it solves, and how it can empower us.

Read More →
Landing zones by Jenny Tang
Compliance

What is a Landing Zone?

For most companies shifting to the cloud, the cloud environment and resources needed to set up numerous accounts is complex. The challenge grows when balancing efficiency with security–organizations want complete cloud environments as soon as possible without overlooking key elements such as establishing firewalls or access controls. Addressing this issue begins with a landing zone, a secured and well-architected multi-account cloud environment that acts as a starting point or template allowing organizations to quickly deploy users, accounts, and environments for business needs.

Read More →
HanaByte Culture

HanaByte Hearts: Atlanta Children’s Day Shelter

The outreach beyond our cybersecurity offerings, or in essence, how we give back to our communities, industry, and fellow professionals and neighbors, plays just as significant a role in our culture as the security measures that we’re experts in offering as a business partner. We explored how we can make a difference with Atlanta Children’s Day Shelter for Q1 of our outreach program, HanaByte Hearts this year.

Read More →
HanaByte blog compliant Operating System with HanaByte consultant Simon Abisoye
Compliance

Compliant Operating System (OS)

A compliant operating system is any operating system that meets specific standards established by an entity. For example, if an organization wanted to create a CIS-compliant operating system, it would need to meet the standards set forth by the Center for Information Security, whose sole purpose is to “create confidence” in the connected world. A virtual machine image (VMI or image for short) is a bootable copy of the operating system of a virtual machine in the cloud.

Read More →
Patrick Davis for HanaByte blog on SASE
Automation

How SASE Can Benefit You

Secure Access Service Edge (SASE) is a “cloud architecture model that combines network and security-as-a-service functions together and delivers them as a single cloud service.” (Fortinet Cyberglossary) This solution allows hybrid organizations and their hybrid or remote workers to benefit from corporate security mechanisms anywhere they might be located, securely extending the network edge.

Read More →