Detecting and Protecting PII in AWS in 2025

Cloud services offer on-demand, scalable computing resources, making them invaluable for handling large datasets, including sensitive information like Personally Identifiable Information (PII) and Protected Health Information (PHI)…
If A Secret Rotates In The Woods, Will Anyone Hear It?

While GCP provides a built-in mechanism for scheduling secret rotation, the actual implementation is left to you. After defining strategies for secret rotation, we’ll walk through some examples of how you can implement these strategies…
AWS re:Invent 2024 Security Announcements: How AI and Automation is Shaping Cloud Security

HanaByte’s AWS team attended AWS re:Invent 2024, which was a hub for groundbreaking innovations. As an AWS Partner since 2022, we have been focused on being at the forefront of technology advancements as organizations choose HanaByte for their security, governance, and compliance goals…
Terraform Best Practices

Terraform is a popular tool that allows developers to manage resources and collaboratively deploy infrastructure as code (IaC) for cloud technologies. It enables organizations to define, provision, and manage cloud resources in a consistent and automated way. Following best practices effectively is essential to ensure that Terraform configurations are reliable, maintainable, and secure…
From Salesforce Recruitment to Cloud Security: A Business Development Manager’s Journey into AWS

The cloud industry is so fast-paced, with AWS at the forefront of providing scalable and flexible cloud solutions to businesses across various sectors. Although my experience with Salesforce has given me a strong foundation in understanding complex technical environments and client needs, AWS’s extensive service portfolio demands a deep dive into new concepts and capabilities…
How CCSK makes for better DevSecOps and Agile practices

When it comes to technical certifications, there is no shortage of options to study for and exams to sit through. One in particular that has enjoyed ongoing relevance in cloud security best practices is the CCSK (Certificate of Cloud Security Knowledge), which was first introduced by the Cloud Security Alliance (CSA) in 2010…
HanaByte and CSA: Shaping the Future of a Secure Cloud Together

HanaByte has joined the Cloud Security Alliance (CSA) as a Trusted Cloud Consultant (TCC)! We are excited as a company to have this announced earlier this year, and we would love to take the time to explain who the CSA is, what it means for HanaByte as a company, and how it matters to those who are seeking a trusted advisor in cloud security…
Cloud Services Bill of Materials: An Idea Whose Time Has Come

A Cloud Services Bill Of Materials (CSBOM) is a comprehensive listing of each cloud-based asset utilized by a service that you run. For instance, if your company has a SaaS offering, it is very likely that the offering is dependent on a number of services provided by one or more cloud providers…
To Build or To Buy…That is The Question

Building in house can take a lot of time, and unintentionally introduce more maintenance overhead in the long run. As an example, they may choose instead to purchase a ticketing support solution, thereby getting a quick resolution to their problem and keeping good communication with customers. On the flip side, picture a data analytics company spearheading a project that would require several integrations with various platforms and instead deciding it is simpler to build an in house solution rather than researching, vetting, and purchasing something that ultimately may not have all of the integrations needed and stalls business productivity…
Deep Dive: How Google Cloud Firewall is Revolutionizing Security

In this article, we will be examining the native firewall capabilities in Google Cloud and how Cloud Firewall stacks up to some of the competition…