Thundra Logo Z

Advanced Tips on Managing Multi-Account Setup on AWS with Terraform

| | aws, DEVOPS, iam, Terraform
In this article, we’ll discover how to use HashiCorp's popular infrastructure as code tool, Terraform in our advantage on AWS, specifically to manage multiple accounts as this is the way AWS wants ...

Introducing Signal Sciences Terraform Provider

| | DEVOPS, integrations
Introducing Signal Sciences Terraform Provider DevOps has always been part of Signal Sciences’ DNA: the company was created when the founders couldn’t find a WAF solution that could keep pace with the ...
Raspberry Pi sensors for home networks

Who’s your fridge talking to at night?

By Gary Fisk, Sales Engineer, Corelight I love origin stories – the tales of grand plans, unforeseen circumstances, and necessity that creates something new. These strange times have resulted in something new ...
Understand the role of Identity and Access Management with hyperautomation in the public cloud.

What Hyperautomation Means for Identity and Data Governance

Hyperautomation is a process in which businesses automate as many business and IT processes as possible using tools like AI, […] The post What Hyperautomation Means for Identity and Data Governance appeared ...
Secure Your Cloud Native Applications and DevOps Pipeline in Six Steps

Secure Your Cloud Native Applications and DevOps Pipeline in Six Steps

Editor’s Note: This is part three of a blog series on securing privileged access and identities in the cloud. Part 1: Five Best Practices for Securing Privileged Access and Identities for the Cloud ...
Siemplify Joins MVISION Marketplace as an Inaugural Member and Preferred SOAR Partner: What This Means for You

Siemplify Joins MVISION Marketplace as an Inaugural Member and Preferred SOAR Partner: What This Means for You

  From grabbing the latest social media app to landing a vacation rental, the trend of online marketplaces is rapidly... The post Siemplify Joins MVISION Marketplace as an Inaugural Member and Preferred ...

What is Policy Compliance? Four Tips to Help You Succeed

Policy compliance within the information security space can be an exhausting concept to wrap our heads around. Writing a policy document, publishing it to staff and then staying hands-on to ensure it ...

3 Steps to Building a Resilient Incident Response Plan

According to the Accenture State of Cybersecurity 2020 report, the average cost of a cyber attack for ‘non-leaders’ stands at $380,000 per incident. The report classifies organizations into ‘leaders’ and ‘non-leaders.’ The ...
New Radicals - You Get What You Give (Official Video)

Shine Theory / DevOps / Community

A podcast called The Allusionist (hosted by Helen Zaltzman) crossed my path that provided me with a light-bulb moment. The podcast focuses on language and etymology. This particular episode contextualised that focus ...
Refactoring a Live SaaS Environment

Refactoring a Live SaaS Environment

We decided to refactor and re-implement almost all of our back-end and UI. This is how we went through the design and implementation. You can experience the new design by trying ShiftLeft ...