Cyber Defense Advisors

Cyber News

Developer Virtual Machines as Bastion Hosts

ACM.76 Why you might want to move development to cloud VMs This is a continuation of my series on Automating Cybersecurity Metrics. I’ve been logging into a VM on AWS to deploy CloudFormation scripts up to this point in this series. I am using a host I previously deployed in an automated fashion from another project, […]

Cyber News

When It Comes to M&A, Security Is a Journey

Shiva Persaud is the director of security engineering for Cisco. His team is responsible for the Cisco Secure Development Lifecycle (CSDL), a set of practices based on a “secure-by-design” philosophy developed to ensure that security and compliance are top-of-mind in every step of a solution’s lifecycle. This blog is the third in a series focused […]

Cyber News

Cybersecurity Re-Launchers: Pivoting into Cybersecurity as a Mid-Career Professional

It is never too late to start a career in cybersecurity — this may sound cliché, but it holds a lot of truth. If you are passionate about the topic and are ready to put in the work to acquire the skills and knowledge needed, anyone, regardless of educational background, can break into cybersecurity. At […]

Cyber News

Complex Impersonation Story

This is a story of one piece of what is probably a complex employment scam. Basically, real programmers are having their resumes copied and co-opted by scammers, who apply for jobs (or, I suppose, get recruited from various job sites), then hire other people with Western looks and language skills are to impersonate those first […]

Cyber News

German Cybersecurity Chief Faces Sacking Over Possible Russia Ties

Schoenbohm accused of having maintained contacts with people involved with Russian security services

Cyber News

Endpoint Detection and Response – you need it on mobile devices too

This blog was written by an independent guest blogger. Welcome to the final episode in our blog series focused on Mobile Endpoint Security.  The first two episodes detailed the protections necessary to secure data accessed by remote workers (Endpoint security and remote work) and best practices for combating the threat of ransomware 5 ways to […]

Cyber News

Facebook Login Details at Risk as Meta Identifies Over 400 Malicious Apps

Some of the malicious apps are able to evade detection and continue to make it onto legitimate app stores

Cyber News

AWS Private Link and VPC Endpoints

ACM.75 An alternative to NATs and Internet Gateways This is a continuation of my series on Automating Cybersecurity Metrics. We looked at adding a VPC configuration for our Lambda function in an earlier post in this series where I demonstrated how a Lambda function that had Internet access may be abused. I also mentioned two options […]

Cyber News

DNS and NTP on AWS

ACM.74 How these crucial services work by default and what happens if you want to use your own DNS and NTP servers on AWS This is a continuation of my series of posts on Automating Cybersecurity Metrics. It’s always DNS… Everything in AWS needs to access DNS or it will break. And I mean EVERYTHING. When we […]

Cyber News