Published in Cloud Security·PinnedCybersecurity Author, Teri RadichelPublications and Presentations by Teri Radichel — Teri Radichel is a professional cybersecurity speaker, trainer, and author. The following are links to some of her past presentations, articles, blog posts, books, and security classes. …Cloud Security4 min read
Published in Cloud Security·May 13When the cloud runs out of VMsConsider reserving capacity if you’re counting on Azure — I’ve been teaching a revamped version of my Azure class over the past few weeks. It’s been very challenging as I opened a new account a while back and have been trying out some features in preview. I paid for a support plan to try to resolve some issues, most…Azure5 min read
Published in Cloud Security·May 12Upcoming changes to Google Drive in 2022 will change some of your files to linksWhy you might care and how to prevent it in standard accounts — Another super quick post so please forgive typos! I’m really busy these days. …Google Drive3 min read
Published in Cloud Security·May 2Check Your Google Chrome VersionBonus: Difference between vulnerabilities discovered by security researchers and zero day updates in security announcements — I’m supposed to be getting ready for an Azure class, but this PSA is too important to wait. Thanks to some trolls I thought it was worth a few minutes to write this up. I blame an outdated version of Chrome that isn’t highlighting typos for any misspellings. j.k. Whenever…Chrome6 min read
Published in Cloud Security·Apr 20Container Escape Vulnerability in AWS Hot PatchUpdate or mitigate now if you are affected (if you run containers, you probably are.) — Thank you to David Jones at Security Dive for bringing this to my attention. Palo Alto’s Unit 42 discovered a vulnerability in the AWS Log4Shell hot patch. …Container Escape5 min read
Published in Cloud Security·Apr 19On Becoming an AWS HeroPondering changes to the Seattle AWS Meetup — People always ask me how to become an AWS Hero. Honestly, I really don’t know because the process is somewhat secretive. I think you have to be recommended internally by AWS employees. I didn’t even know what an AWS Hero was when I was invited to be one. I thought…AWS19 min read
Published in Cloud Security·Apr 12What I would change on Microsoft AzureA few submissions for the Azure Wishlist and an Azure Support Diary — I’ve been working on some new ideas on Microsoft Azure that intrigue me such as using a remote IdP to handle user authentication with Azure handling authorization. I also signed up for Standard support ($100/month) to see if it can help me resolve the issues more quickly. Some of the…Azure58 min read
Published in Cloud Security·Apr 10Assessing Supply Chains ~ The PeopleWhen assessing potential products include a review of executives, technical staff, investors, and board of directors — This post is part of a series on an adventure to connect a PFSense firewall and a Ubiquiti Dream Machine Pro. See the bottom of the post for all the posts in this series. I wrote in my last post about a third-party hosted Mapbox API called by the Ubiquiti…Network Security12 min read
Published in Cloud Security·Apr 9Host-based Firewall to Validate Network FirewallAnother way to watch the watchers and understand potential supply chain attacks — This post is part of a series on an adventure to connect a PFSense firewall and a Ubiquiti Dream Machine Pro. See the bottom of the post for all the posts in this series. I mentioned in the previous post on first impressions using a Ubiquiti UDM Pro, that I…Network Security5 min read
Published in Cloud Security·Apr 8Ubiquiti Dream Machine Pro ~ First ImpressionsInitial attempt to set up the device, use the phone app, and set up a VLAN — This post is part of a series on an adventure to connect a PFSense firewall and a Ubiquiti Dream Machine Pro. See the bottom of the post for all the posts in this series. This is just me clicking around trying to set up a Dream Machine Pro. If you…Network Security21 min read