From Salesforce Recruitment to Cloud Security: A Business Development Manager’s Journey into AWS
The cloud industry is so fast-paced, with AWS at the forefront of providing scalable and flexible cloud solutions to businesses across various sectors. Although my experience with Salesforce has given me a strong foundation in understanding complex technical environments and client needs, AWS’s extensive service portfolio demands a deep dive into new concepts and capabilities…
How CCSK makes for better DevSecOps and Agile practices
When it comes to technical certifications, there is no shortage of options to study for and exams to sit through. One in particular that has enjoyed ongoing relevance in cloud security best practices is the CCSK (Certificate of Cloud Security Knowledge), which was first introduced by the Cloud Security Alliance (CSA) in 2010…
HanaByte and CSA: Shaping the Future of a Secure Cloud Together
HanaByte has joined the Cloud Security Alliance (CSA) as a Trusted Cloud Consultant (TCC)! We are excited as a company to have this announced earlier this year, and we would love to take the time to explain who the CSA is, what it means for HanaByte as a company, and how it matters to those who are seeking a trusted advisor in cloud security…
Cloud Services Bill of Materials: An Idea Whose Time Has Come
A Cloud Services Bill Of Materials (CSBOM) is a comprehensive listing of each cloud-based asset utilized by a service that you run. For instance, if your company has a SaaS offering, it is very likely that the offering is dependent on a number of services provided by one or more cloud providers…
To Build or To Buy…That is The Question
Building in house can take a lot of time, and unintentionally introduce more maintenance overhead in the long run. As an example, they may choose instead to purchase a ticketing support solution, thereby getting a quick resolution to their problem and keeping good communication with customers. On the flip side, picture a data analytics company spearheading a project that would require several integrations with various platforms and instead deciding it is simpler to build an in house solution rather than researching, vetting, and purchasing something that ultimately may not have all of the integrations needed and stalls business productivity…
Deep Dive: How Google Cloud Firewall is Revolutionizing Security
In this article, we will be examining the native firewall capabilities in Google Cloud and how Cloud Firewall stacks up to some of the competition…
Reduce Your Carbon Footprint in Google Cloud (and be more secure!)
Google has many services that can be leveraged to create a low cost, secure environment for your cloud infrastructure; Load Balancing, Google Kubernetes Engine (GKE), Cloud Security Command Center, Intrusion Detection System, and Identity and Access Management (IAM). Google’s security mindset and sustainability initiatives overlap and strengthen each other in several ways…
Beyond the Boundaries, Exploring How You Can Better Protect Your Home
Co-founder and senior consultant, Michael Greenlaw, had the opportunity to present at HashiTalks: Secure in February of 2023. His presentation addressed “HashiPass – Vault and Boundary; Managing Secrets at Home” which was a dissection of the ways that you can be better aware of your security when it comes to access and password management…
Managing with Password Managers
A new age has begun in the digital world: the beginning of the end for passwords. Staff Consultant, Jenny Tang, explores the past and the future of password managers…
Understanding Google Chrome’s Manifest V3
Written By Understanding Google Chrome’s Manifest V3 Google Chrome is a cross-platform web browser developed by Google in 2008 for accessing the World Wide Web and running Web-based applications and is currently dominating as the most popular web browser at 65.84% market share. Google Chrome extensions are one of the most beloved and implemented features […]