top of page
A Serial Case of AIR on the Side-Channel
In our previous post, we covered the mechanism of API access Into SOA/cloud Runtime by way of Amazon Web Services' SSM stack - an API...
Once Upon a Cloudy AIR I Crossed a Gap Which Wasn't There
A key tenet of security paradigm and function is the concept of segmentation - developers are taught (and sometimes forced) to keep data...
Atomic Shelters for Active Observers – Hardening by Example (part 2)
In part 1 of this series we defined a valuable target objective for attackers seeking to advance compromise of a client environment,...
Protecting the Watchtower - Hardening by Example (part 1)
Entities enlisting the services of red teams generally have their house in order to include management and monitoring infrastructure to...
Nomenclature Reclamation: Taking "Hardening" back to Principles and Practices
The term "hardening" is originally sourced from the metallurgical (material sciences of the time) practices around creating processes and...
The Computing Pendulum and Private Cloud
The US market for private cloud has taken a turn for the worse in recent years, to put it mildly. The dream of scalable and resilient...
Secure by Design (Instead of Waiting for the Facts to Hit the Fan)
Hello again world, this time in Wix format. For those who do not know us yet, we are Semper Victus, a cabal of consultants and...
Blog: Blog
bottom of page