Blog

The Answer for Cloud Threat Defense is not Evident

Cloud service providers, data-center security vendors and network security companies are acquiring cloud security startup companies at an increasing pace. This consolidation is fueled by the rapid...

Read More

Varun Badhwar

03.14.18 13:35 PM

“Meltdown” and “Spectre”: RedLock has you Protected

 

The recent disclosures of the Spectre and Meltdown vulnerabilities underscores the need for cloud computing customers to fulfill their role in the cloud shared responsibility model, embraced by

Read More

Varun Badhwar

01.17.18 13:26 PM

Ensuring CIS, PCI, and HIPAA Compliance with RedLock

This blog was originally published as a guest post in the AWS Startups Blog.

Read More

Varun Badhwar

12.14.17 12:21 PM

2017 Cloud Threat Defense Lessons Learned

Before founding RedLock, I spent over 10 years in cloud security - both as a practitioner at a leading cloud service provider, and later as a company builder at a leading CASB. From those...

Read More

Varun Badhwar

12.14.17 11:38 AM

Vegas Re:Invented

Are you headed to AWS re:Invent? The RedLock team is hosting several events and you're invited to join us!

  • Already at the MGM Grand for security sessions? Schedule some time to meet with me at...

Read More

Varun Badhwar

11.14.17 22:09 PM

Security Best Practices for AWS Access Key Deletion

Recent months have seen a number of high profile breaches such as the OneLogin breach that resulted from compromised access keys. In these instances, the affected organizations failed to meet...

Read More

RedLock CSI Team

08.15.17 14:37 PM

3 Key Takeaways from AWS Community Day

Last week, the first AWS Community Day was held in San Francisco. Unlike most conferences that are sponsored by vendors, this free event was organized by AWS community leaders and heroes...

Read More

Amy Heng

06.20.17 23:20 PM

Misconfiguration Exposes 198 Million American Voter Records

During the 2016 election, the Republican National Committee (RNC) hired Deep Root Analytics (DRA) to analyze political voting behaviors of Americans. DRA is storing 25 terabytes of sensitive voter...

Read More

Varun Badhwar

06.20.17 0:26 AM

Lessons from the OneLogin Breach

Research has shown that people with the GG genotype are able to quickly learn from their mistakes. We are starting the “Cybersecurity GG Genotype” blog series where we will analyze breaches and...

Read More

Gaurav Kumar

06.08.17 14:05 PM

Amazon S3 Misconfiguration Advisory

Researchers (most notably Chris Vickery) have discovered that a common misconfiguration in Amazon Simple Storage Service (Amazon S3) may expose sensitive enterprise data to unauthorized access....

Read More

RedLock CSI Team

05.24.17 22:21 PM

Subscribe to Email Updates

Recent Posts