Blog All Machine Learning Business Analysis Consultancy Artificial Intelligence DevOps Solutions Architect Delivery Manager Rozwój w PGS Data science Cloud Software Development Quality Assurance Design News Events Amazon AWS AWS Cloud cloud security ethical hacking Hack hacking kubernetes security security in the cloud Hacking into an AWS Account – Part 3: Kubernetes In this instalment of the AWS hacking series, I’ll give you an overview of the potential weak points of Kubernetes and show you how I uncovered real-life credentials during my last research run. AWS hacking Jenkins security Hacking into an AWS Account – Part 2: Jenkins In this article, we’ll review potential security issues and establish what you can do to secure your AWS accounts against any unwanted access through Jenkins. AWS Cloud ethical hacking security security in the cloud Hacking into an AWS Account – Part 1: Atlassian Apps As our increasingly sophisticated technology creates more and more interconnected systems, the need for greater security becomes more important than ever. Yet cyber security doesn’t equal setting up a firewall or an antivirus software anymore; it’s a process involving policies, training, compliance, risk assessment and infrastructure. Not having this process… security tips & tricks website Is your website’s URL properly secured? Introduction Every computer system has been created to process data and websites are not an exception. You can experience data processing every day – while scrolling your favorite social media or checking invoices from your electricity supplier. Many systems have data storage solutions, and in many cases they rely on… AWS Cloud Cloud computing security Well Architected Review Cloud Security in AWS: The Most Common Issues Security is arguably the most important issue when it comes to the Cloud. It’s one of the biggest concerns companies have before migrating, and it’s something even Cloud-native companies check up on regularly. In short, it’s important to always be up to date with modern security standards. One way to do… Cloud security Cloud Security – How Safe Is Your Data? Cloud-based solutions have been adopted by many firms around the globe. However, many non-adopters remain sceptical – often due to concerns about data security in the Cloud. How justified are those concerns? Let’s find out. The topic of data security is often laid out in technical terms and that’s why… Android banking Mobile security CodeMobile Developer Conference, Chester, 18th – 20th April 2017 PGS Software Android guru, Tomasz Zielinski, will be speaking at this conference on Wednesday 19th April at 13.45. His talk is “The state of security of Android banking apps in Poland” Apple iOS security sql Securing your app with encrypted-core-data It’s true that Apple cares very much about user’s privacy. Since iOS 8.3, it’s impossible to access arbitrary data in an application’s sandbox. Additionally, developers may choose to enable “Data Protection” option for their app, which will encrypt the sandbox if the device is locked with a passcode. Nonetheless, some extra protection wouldn’t hurt, if it didn’t involve too much work. injection owasp security sql zap Finding Security Gaps in Your Application with OWASP ZAP Tool Recently, we had a great opportunity to implement the OWASP security standards for the applications we have been developing for our client – a fleet management and driver mobility company. ISO security Our Integrated Management System Receives the ISO 27001 Certificate ‘ISO 27001 on board’ stated an e-mail recently sent to us by Tomasz Watras, our IT Quality Assurance Manager. This short headline was a pinnacle of our long road started back in April last year. After some cheering, the only thing we had left was to wait a bit for our certificate to arrive – and to let you know! Popular posts Hacking into an AWS Account – Part 3: Kubernetes Hacking into an AWS Account – Part 2: Jenkins Hacking into an AWS Account – Part 1: Atlassian Apps Is your website’s URL properly secured? 12>