The RunAsCloud Blog

arrow pointing left
October 28, 20192

Shifting Left with Vulnerability Management

Leave a Comment

Recently a friend of mine told me his company, in an effort to improve security, was launching a bug bounty program. I’m a huge fan of bug bounty programs, hiring professionals to test your code is a great way to find things you may have missed and lets your clients, employees and investors know that […]

Read More
October 17, 20193

What Really is DevOps?

Leave a Comment

When I started my career as a Systems Administrator, I thought that I would be doing that for my whole career. A few years later, I thought to myself, ”If I were to progress, what would be my next step?” After a little bit of research, I learned of a position called a DevOps Engineer. […]

Read More
September 22, 20191

Pritunl Zero

Leave a Comment

Pritunl is an open source OpenVPN and IPSec solution that comes with a somewhat popular VPN client. Pritunl Zero fills in a few more gaps by providing zero trust access to SSH and Web Services similar to products such as Akamai EAA and Zscaller. I installed an individual server using this guide. It was relatively […]

Read More
September 21, 20191

Enterprise Technology Leadership and Innovation

Leave a Comment

An Interview with Tricia Ferreira, VP, Technology Product Management at World Fuel Services – on asking the right questions, leveraging expert resources, and inspiring innovation. Originally from Trinidad & Tobago, Tricia moved to the United States and studied Computer Science at FIU. She moved to Atlanta and held prominent leadership positions in Technology at GE. […]

Read More
August 9, 2019Like

Capital One and EC2 – part 3

Leave a Comment

In two previous articles, I described how the Capital One breach took advantage of an EC2-specific function to obtain AWS credentials which were then used to obtain multiple files containing sensitive information.  If you haven’t already done so, I’d encourage you to read parts one and two before continuing. You might also want to pull up the complaint for […]

Read More
August 6, 2019Like

Capital One and EC2 – part 2

Leave a Comment

In a previous post, I mentioned that the attack vector for the Capital One breach specifically targeted an EC2 feature. In this post, I’ll give my educated guesses about how the attack actually worked. [Note 1: if anyone happens to have any of the contents of the original gist then I’d love to get a look […]

Read More
August 5, 2019Like

Capital One and EC2 Hack – an Overview

Leave a Comment

There’s been a ton of coverage of the recently discovered Capital One breach. I’m generally very skeptical when AWS security makes the news; so far, most “breaches” have been a result of the customer implementing AWS services in an insecure manner, usually by allowing unrestricted internet access and often overriding defaults to remove safeguards (I’m […]

Read More
July 31, 2019Like

How to Set Up a YubiKey 5C

Leave a Comment

Yubi what? A YubiKey is Yubico hardware authentication device designed to achieve secure 2-factor authentication (2FA) for online services like AWS, computer logins, developer tools, password managers and other important data. The YubiKey combines hardware-based authentication and public key cryptography to eliminate account takeovers and provides the extra security you need.  YubiKey’s were created by […]

Read More