Whitepaper: Don’t think serverless security, think application security

April 21, 2019

As the next logical step in cloud computing, serverless is fundamentally changing the way developers need to think about applications and write code. While new technologies will always raise security questions, claims that serverless poses new risks are incorrect; there are no new cybersecurity threats that are serverless-specific. In fact, serverless can actually improve an application’s security posture. This includes advantages such as that the serverless provider handles security for major parts of the stack and a small, contained blast radius.

Spotlight

Etonwood Limited

Etonwood specialises in searching for and attracting infrastructure technologists within financial markets. Our clients consider us to be a trusted part of their recruitment process. Our experience is both broad and deep, and our approach to our work is driven by focus, intelligence and attention to detail.

OTHER WHITEPAPERS
news image

22 Cybersecurity Tips for 2022

whitePaper | June 13, 2022

Many cyber-attacks involve ransomware, a form of malicious software or malware, designed to deny access to a computer system or data until a ransom is paid and a decryption key (commonly called a decryptor) is given to the victim. The encryption is virtually unbreakable without the decryption key, and you should not spend valuable time seeking a way around the encryption if you are attacked with it. Ransomware can spread in multiple ways, but most typically, through phishing emails or by unknowingly visiting an infected website. Ransomware can be catastrophic to healthcare and other organizations, preventing critical information and systems for patient care from being accessed, for example.

Read More
news image

identity and zero trust - H-ISAC

whitePaper | August 25, 2022

These days, you can’t have a conversation about cybersecurity without talking about zero trust. The security concept requires that all individuals and devices on a network be continuously authenticated, authorized, and monitored. Gone are the days of letting someone in the front door, giving them a role with access privileges and then having them go about their merry way.

Read More
news image

Ransomware Data Recovery Architectures

whitePaper | September 26, 2022

Ransomware attacks have been on the rise in recent years. They are extremely insidious in nature and have been foremost in many CEOs’ and CIOs’ minds lately. Ransomware is malware that prevents an enterprise from accessing and using its data, usually by encrypting the data in an inconspicuous manner so the victim does not know the attack is occurring.

Read More
news image

Cybersecurity 2018

whitePaper | February 2, 2020

Small businesses usually neglect cybersecurity as an essential function making their IT infrastructure vulnerable. IT security issues often cost companies a lot of money and downtime every year. Even if the IT infrastructure consists of couple laptops and Devices, cybersecurity should always be a top priority.

Read More
news image

Password Safe Cloud 22.2 Security Whitepaper

whitePaper | August 5, 2022

The purpose of this document is to help technically-oriented professionals understand the security-related value BeyondTrust can bring to their organization. BeyondTrust can help your support organization stay secure and compliant, while improving the efficiency and success of your organization with a better end-user support experience.

Read More
news image

Best Practices for Row Level Security in Tableau with Entitlements Tables

whitePaper | January 18, 2023

Row Level Security (RLS) in Tableau refers to restricting the rows of data a certain user can see in a given workbook or data source at the time they view the data. It contrasts with permissions within Tableau Server (or Tableau Online), which are used to control access to content and feature functionality.

Read More

Spotlight

Etonwood Limited

Etonwood specialises in searching for and attracting infrastructure technologists within financial markets. Our clients consider us to be a trusted part of their recruitment process. Our experience is both broad and deep, and our approach to our work is driven by focus, intelligence and attention to detail.

Events