• Case Studies
  • Blog
EN
PL

Blog

All
Machine Learning
Business Analysis
Consultancy
Artificial Intelligence
DevOps
Solutions Architect
Delivery Manager
Rozwój w PGS
Data science
Cloud
Software Development
Quality Assurance
Design
News
Events
Amazon AWS
AWS
Cloud
cloud security
ethical hacking
Hack
hacking
kubernetes
security
security in the cloud

Hacking into an AWS Account – Part 3: Kubernetes

In this instalment of the AWS hacking series, I’ll give you an overview of the potential weak points of Kubernetes and show you how I uncovered real-life credentials during my last research run.
November 24, 2020,
Michał Brygidyn
AWS
hacking
Jenkins
security

Hacking into an AWS Account – Part 2: Jenkins 

In this article, we’ll review potential security issues and establish what you can do to secure your AWS accounts against any unwanted access through Jenkins. 
October 21, 2020,
Michał Brygidyn
AWS
Cloud
ethical hacking
security
security in the cloud

Hacking into an AWS Account – Part 1: Atlassian Apps

As our increasingly sophisticated technology creates more and more interconnected systems, the need for greater security becomes more important than ever. Yet cyber security doesn’t equal setting up a firewall or an antivirus software anymore; it’s a process involving policies, training, compliance, risk assessment and infrastructure. Not having this process…
August 26, 2020,
Michał Brygidyn
security
tips & tricks
website

Is your website’s URL properly secured?

Introduction Every computer system has been created to process data and websites are not an exception. You can experience data processing every day – while scrolling your favorite social media or checking invoices from your electricity supplier. Many systems have data storage solutions, and in many cases they rely on…
May 15, 2020,
Karol Joński
AWS
Cloud
Cloud computing
security
Well Architected Review

Cloud Security in AWS: The Most Common Issues 

Security is arguably the most important issue when it comes to the Cloud. It’s one of the biggest concerns companies have before migrating, and it’s something even Cloud-native companies check up on regularly. In short, it’s important to always be up to date with modern security standards. One way to do…
August 28, 2019,
Michał Brygidyn
Cloud
security

Cloud Security – How Safe Is Your Data?

Cloud-based solutions have been adopted by many firms around the globe. However, many non-adopters remain sceptical – often due to concerns about data security in the Cloud. How justified are those concerns? Let’s find out. The topic of data security is often laid out in technical terms and that’s why…
June 5, 2019,
Michał Brygidyn
Android
banking
Mobile
security

CodeMobile Developer Conference, Chester, 18th – 20th April 2017

PGS Software Android guru, Tomasz Zielinski, will be speaking at this conference on Wednesday 19th April at 13.45. His talk is “The state of security of Android banking apps in Poland”
April 13, 2017,
Jo Lewis
Apple
iOS
security
sql

Securing your app with encrypted-core-data

It’s true that Apple cares very much about user’s privacy. Since iOS 8.3, it’s impossible to access arbitrary data in an application’s sandbox. Additionally, developers may choose to enable “Data Protection” option for their app, which will encrypt the sandbox if the device is locked with a passcode. Nonetheless, some extra protection wouldn’t hurt, if it didn’t involve too much work.
October 5, 2016,
Paweł Szot
injection
owasp
security
sql
zap

Finding Security Gaps in Your Application with OWASP ZAP Tool

Recently, we had a great opportunity to implement the OWASP security standards for the applications we have been developing for our client – a fleet management and driver mobility company.
June 21, 2016,
Bartosz Ziemba
ISO
security

Our Integrated Management System Receives the ISO 27001 Certificate

‘ISO 27001 on board’ stated an e-mail recently sent to us by Tomasz Watras, our IT Quality Assurance Manager. This short headline was a pinnacle of our long road started back in April last year. After some cheering, the only thing we had left was to wait a bit for our certificate to arrive – and to let you know!
August 21, 2015,
Krzysztof Piskorski

Popular posts

Hacking into an AWS Account – Part 3: Kubernetes
Hacking into an AWS Account – Part 2: Jenkins 
Hacking into an AWS Account – Part 1: Atlassian Apps
Is your website’s URL properly secured?
12>

Made with in PGS Software

Copyright © PGS Software 2005 - 2023

  • Privacy policy
  • For Investors/ Dla Inwestorów
  • Careers

Copyright © PGS Software 2005 - 2023