Syndicated Blog

Strobes Security
Continuously Charting Your Threat Exposure Journey
Cloud Pentesting 101: What to Expect from a Cloud Penetration Test

Cloud Pentesting 101: What to Expect from a Cloud Penetration Test

Hold on, let’s guess.  You’ve moved a ton of your business to the cloud – storage, applications, the whole nine yards. Cloud computing offers flexibility, scalability, and a bunch of... The post ...

New York State Cybersecurity Regulations Now in Effect: What You Need to Know?

| | Compliance, Cybersecurity
As of November 1, 2024, the new amendments to the New York State Department of Financial Services (NYDFS) Cybersecurity Regulations have officially come into play. These regulations are significant for... The post ...
Integrating Penetration Testing as a Service (PTaaS) with CI/CD Pipelines: A Practical Guide 

Integrating Penetration Testing as a Service (PTaaS) with CI/CD Pipelines: A Practical Guide 

Imagine this: you’re all set to launch a new software update, and then—bam!—you find out there’s a security flaw that could put your entire customer base at risk. It’s a... The post ...
How PTaaS Supports Shift-Left Security Practices?

How PTaaS Supports Shift-Left Security Practices?

Security and development teams often face a tough challenge: delivering a secure, quality product quickly without bogging down the pipeline. Security testing is traditionally squeezed in late, sometimes even right... The post ...
Major Data Breaches of October 2024 

Major Data Breaches of October 2024 

October saw several high-profile data breaches, underscoring the ongoing urgency of strong cybersecurity measures. From tech giants to healthcare providers, multiple sectors experienced critical security incidents that exposed sensitive data.... The post ...
Top CVEs & Vulnerabilities of October 2024

Top CVEs & Vulnerabilities of October 2024

October has brought some serious vulnerabilities to the forefront, capturing the attention of cybersecurity teams across industries. If you’re managing IT security or staying alert to cyber threats, knowing which... The post ...
How we managed Aurora Serverless V2 Idle connections in RDS Proxy and saved RDS costs by 50%

How we managed Aurora Serverless V2 Idle connections in RDS Proxy and saved RDS costs by 50%

| | Engineering
Introduction In a recent migration from a standard RDS DB instance to Aurora RDS PostgreSQL Serverless V2, we encountered an unexpected issue. A significant and unexplained increase in database connections.... The post ...
How we managed Aurora Serverless V2 Idle connections in RDS Proxy and saved RDS costs by 50%

How we managed Aurora Serverless V2 Idle connections in RDS Proxy and saved RDS costs by 50%

| | Engineering
The post How we managed Aurora Serverless V2 Idle connections in RDS Proxy and saved RDS costs by 50% appeared first on Strobes Security ...
What is Vulnerability Management? Compliance, Challenges, & Solutions

What is Vulnerability Management? Compliance, Challenges, & Solutions

Is your vulnerability management game on point? If it’s not, you’re handing attackers an open invitation. And if you believe that merely using a vulnerability scanner qualifies as effective management,... The post ...

Penetration Testing Frequency: How Often Is Enough?

Is your penetration testing completed for this quarter? If it’s not you are giving an open door to Malicious actors to breach the data. Do you know 75% of companies... The post ...