People in front of computers using a SOC-as-a-service solution.

What Defines a Modern SOC-as-a-Service Solution? [Part I]

In today’s post, the first of a two-part series, we’ll discuss what defines a modern SOC-as-a-Service solution, also known as outsourced or co-managed security operations center (SOC). Whether it’s to supplement experience of in-house security teams, optimize detection and response efforts, or a combination of these, SOC-as-a-Service can provide a lot of advantages that traditional outsourced security… Read More

G Suite Security

G Suite Security: Five Mistakes Every Admin Should Avoid

If your business is migrating to or using Google’s suite of business productivity tools, you might be concerned about properly securing G Suite use. While Microsoft Office 365 still wears the cloud office productivity crown, more than five million businesses now use G Suite, and that number is growing fast. Our partners at Okta noted in their 2019 “Business @… Read More

Racecars, Satellites, and Robots: Our Take on the AWS re:Invent 2018 Conference

Every year, technologists wait for the AWS re:Invent 2018 conference in Las Vegas like a four-year-old on Christmas Eve. At this event, Amazon Web Services announces most of their major product and feature releases, and this year was no exception. At Delta Risk, we pay close attention to these releases every year for ideas on ways we… Read More

Overcoming Cloud Security Challenges

As more businesses are moving towards cloud-based storage, programs and services at a rapid rate, cloud security is an increasingly important issue. But, it’s not one that comes without challenges. Among those challenges are: Software-as-a-Service (SaaS)- Control over accounts, access to data Cloud Infrastructure- Lack of visibility into infrastructure security DevOps- Bypassing some security checkpoints, breaches in… Read More

aws incident response

The Top 3 Open Source Tools for AWS Incident Response

Welcome to our third blog on incident response in the cloud. The first two posts primarily focused on the built-in capabilities from cloud service providers that can help your incident response efforts. We also discussed how to configure your Amazon Web Services (AWS) environment to take advantage of those features. Today, we are going to look at some tools that are… Read More

cloud configurations

New White Paper Spotlights Methods to Avoid Cloud Misconfigurations

It’s easy to assume that cloud service providers are fully responsible for every aspect of cloud security. The truth is that configuration is an aspect of the shared responsibility model of cloud security that often falls in the hands of organizations using cloud services and platforms. IT and security professionals are taking notice of the security threat… Read More