Sign up for our newsletter! →

HanByte

To Build or To Buy…That is The Question

HanaByte blog, Software, Build or Buy

Building in house can take a lot of time, and unintentionally introduce more maintenance overhead in the long run. As an example, they may choose instead to purchase a ticketing support solution, thereby getting a quick resolution to their problem and keeping good communication with customers. On the flip side, picture a data analytics company spearheading a project that would require several integrations with various platforms and instead deciding it is simpler to build an in house solution rather than researching, vetting, and purchasing something that ultimately may not have all of the integrations needed and stalls business productivity.

Reduce Your Carbon Footprint in Google Cloud (and be more secure!)

Jeff Pemberton, Google Cloud, Carbon footprint, Hanabyte blog

Google has many services that can be leveraged to create a low cost, secure environment for your cloud infrastructure; Load Balancing, Google Kubernetes Engine (GKE), Cloud Security Command Center, Intrusion Detection System, and Identity and Access Management (IAM). Google’s security mindset and sustainability initiatives overlap and strengthen each other in several ways.

Beyond the Boundaries, Exploring How You Can Better Protect Your Home

HanaByte, HashiTalks, Boundary, HashiCorp, HanaByte Blog

Co-founder and senior consultant, Michael Greenlaw, had the opportunity to present at HashiTalks: Secure in February of 2023. His presentation addressed “HashiPass – Vault and Boundary; Managing Secrets at Home” which was a dissection of the ways that you can be better aware of your security when it comes to access and password management.

Managing with Password Managers

HanaByte blog, password managers, HanaByte, Cybersecurity consultancy

A new age has begun in the digital world: the beginning of the end for passwords. Staff Consultant, Jenny Tang, explores the past and the future of password managers.

Understanding Google Chrome’s Manifest V3

Google Chrome, Manifest V3, Hanabyte blog, hanabyte

Written By Understanding Google Chrome’s Manifest V3 Google Chrome is a cross-platform web browser developed by Google in 2008 for accessing the World Wide Web and running Web-based applications and is currently dominating as the most popular web browser at 65.84% market share. Google Chrome extensions are one of the most beloved and implemented features […]

An Introduction to OSCAL

Hanabyte blog, OSCAL, eric evans,

Written By An Introduction to OSCAL The Open Security Controls Assessment Language (OSCAL) is a set of data formats that is used to express machine-readable representations of control catalogs, baselines, and security documentation. It is important to recognize that OSCAL is not a tool, but instead a language. Using OSCAL allows us a data interchange […]

CISA: A Quick History

hanabyte blog, CISA, cybersecurity infrastructure security agency, hanabyte

Written By Get to Know CISA Perhaps one of the least understood aspects of information technology is cybersecurity. Despite constant reports of major hacks and data breaches affecting millions of Americans, there are still organizations that either practice poor security habits/protocols or neglect responsibility altogether. At one point, it could be argued this even extended […]