
Blog
-

Cloud Connectivity in AWS: Choosing Between NAT and Internet Gateways
During a few of my AWS Cloud infrastructure build outs, client team members tend to wonder and ask why I
-

The Dual-Edged Sword: How AI is Revolutionizing Cybersecurity and the New Threats It Poses to Businesses
Advancements in artificial intelligence (AI) have had a profound impact on cybersecurity, both positively and negatively. On one hand, AI
-

Back Up and Running in Cloud Native
Finally had the time to rebuild and refresh the blog site. mekena.io in now full Cloud Native running in AWS
-

DNS Security
Well this is an interesting approach by Google to counter DNS cache poisoning effectiveness. https://www.theregister.com/2023/01/19/google_dns_queries/ If your DNS queries LoOk
-

Tech Audits
What systems do security and availability audits cover? A fair question! Well, the hard truth is that it is your
-

Hold my beer!
Company: “Our data is encrypted at rest, and in transit. We are SOC2 assessed and HIPAA compliant. Our Cyber team
-
A Security+ Nostalgia
Going through modern Security+ material, seeing mentions of legacy technologies and methodologies such as Sub7 or War-driving was a pleasant
-

hackathon Gems
If you’re attending a hackathon/security conference looking to recruit good security professionals, keep an eye for those using personal Internet
-

Two-factor authentication – just do it already!
During a recent conversation, I was asked to briefly describe what two-factor authentication is, while keeping the technical bits at




