by Jarrod Levitan | Jun 23, 2017 | Uncategorized
I just got back from a government technology summit in Washington DC. It was hosted by Amazon Web Services (AWS), the leader in the Cloud technology space. I was speaking to someone from the CIA (who will remain anonymous) who was responsible for implementing the...
by Mike Fisher | Jul 11, 2016 | Blog, Blog
All web applications are subject to various vulnerabilities that may be exploited by hackers. Prevalent attacks today include denial-of-service, cross-site scripting and SQL injection. Symptoms may include a reduction in availability, a spike in resource usage or...