Author:

jason

AWS Security

Restrict AWS Console Access Based On Source IP Address

By
on
October 21, 2020

Zero trust, or risk-based authentication, can be hard to achieve (You can read more about it here). Organizations must trust the identity being used and the location from where…

MariaDB MySQL Python

PyMyDB – Simplifying MySQL Backups

By
on
October 20, 2020

Let’s face it, when was the last time you performed a database backup? How about any backup??? PyMyDB was written to help ease the burden of performing MySQL and…

Authentication Security Zero Trust

Building Zero Trust in Authentication

By
on
July 18, 2020

Building Zero Trust

When you think of zero trust, you tend to think of network segmentation. Creating communities of interest (COI’s) and segmenting servers away from each other to prevent…

BIND Domain Name Service Response Policy Zone

BIND Response Policy Zones

By
on
June 10, 2020

Domain Name Service

Accessing resources across the internet is done through the use of IP addresses. When trying to access your email, Google for searching, or your favorite social media…

BIND Domain Name Service

DNS Architecture

By
on
April 10, 2020

Deploying a local BIND DNS server for an organization can be quite daunting. There are a multitude of options available within the configuration of the service. Though secure configurations…