by Jarrod Levitan | Jun 23, 2017 | Uncategorized
I just got back from a government technology summit in Washington DC. It was hosted by Amazon Web Services (AWS), the leader in the Cloud technology space. I was speaking to someone from the CIA (who will remain anonymous) who was responsible for implementing the...
by Mike Fisher | Oct 28, 2016 | Uncategorized
With great power It happens so often it’s almost become cliché. It’s a dark and stormy night. You’re home alone. The phone rings. It’s… Amazon Web Service’s automated identity verification system, calling you back to confirm your account. You enter the PIN...
by Mike Fisher | Jul 11, 2016 | Blog, Blog, Blog
All web applications are subject to various vulnerabilities that may be exploited by hackers. Prevalent attacks today include denial-of-service, cross-site scripting and SQL injection. Symptoms may include a reduction in availability, a spike in resource usage or...