Sign up for our newsletter! →

Terraform Best Practices

Jenny Tang's blog graphic about Terraform

Terraform is a popular tool that allows developers to manage resources and collaboratively deploy infrastructure as code (IaC) for cloud technologies. It enables organizations to define, provision, and manage cloud resources in a consistent and automated way. Following best practices effectively is essential to ensure that Terraform configurations are reliable, maintainable, and secure…

Young Minds Run Free

Hana sitting at Boys and Girls Club table

Since joining HanaByte, I’ve had the opportunity to participate in many HanaByte Hearts events; however, the most enjoyable and informative was getting to serve at the Boys and Girls Club for Career Day. This was a very unique experience at the time, mainly because this was my first time ever doing a career day where I was presenting and I had no idea what to expect initially…

Master Your Disaster

Disaster recovery blog image.

Life is full of ups and downs, and no one can avoid them. This includes natural disasters, accidents, and loss of loved ones. The digital world operates on a similar principle. It’s not a question of if a cyber attack or system failure will happen; it’s when…

How I Used LinkedIn to Break into Cybersecurity

April blog on LinkedIn and cybersecurity with HanaByte

Networking is somehow simultaneously overpromoted and severely underutilized. In some ways, you might feel like it’s too late to start growing a network on LinkedIn, and perhaps you have reconciled with the fact that expanding your connections beyond the same 50 people…

From AFT to ATO: The Prequel

Michael Greenlaw HanaByte blog on AFT to ATO

The purpose of this installment was originally to continue our journey; however, I was fortunate enough to speak on this topic in-depth at HashiTalks. Due to its technical nature, we thought it better to complete the blog series by taking a step back and providing a discussion about what the tool is, the problems it solves, and how it can empower us…

Introducing the Power of AI Security in GCP

hanabyte blog, google cloud partner, AI, hanabyte,

In today’s rapidly evolving world, we recognize the immense potential of artificial intelligence (AI) across many different Industries. Google Cloud Platform (GCP) has harnessed the power of Generative AI to bring cutting-edge security capabilities to the forefront. By centralizing security findings in a streamlined and efficient manner, GCP is revolutionizing the way organizations approach cybersecurity…

A Look at the Modernizing FedRAMP Memo

hanabyte blog, FedRAMP, HanaByte

The White House Office of Management and Budget (OMB) released a draft memorandum with the goals of enhancing the Federal Risk and Authorization Management Program, widely known as FedRAMP. In this blog post, we will go through a brief background on FedRAMP, then dive into the details of the OMB memo, and what it means for the future of FedRAMP…

From AFT to ATO, AWS Native FedRAMP Compliance through Terraform (Part 1)

hanabyte blog, aws account factory, decoupling security data, snowflake

The complexity of achieving a FedRAMP status in this sea of ever-growing cloud architectures, often led us and customers to the same conclusion: new accounts! Why go through the process of updating the entirety of their current architecture, when we only need resources in the authorization boundary to be compliant?…

Decoupling Security Data with Snowflake

hanabyte blog, snowflake, haabyte, Patrick Davis

By harnessing the power of a security data lake on a data platform like Snowflake, you can leverage near-infinitely scalable compute and storage capacity to change the story. With Snowflake’s ecosystem, you can ingest security data in any format and store it together…

HanaByte Hearts: Boys & Girls Club of Metropolitan Atlanta

HanaByte Hearts, Boys and Girls Club of Metropolitan Atlanta, BGCMA, HanaByte

HanaByte chose a youth supporting program as our event for our second quarter. At HanaByte, we firmly believe that the future of cybersecurity starts with people and it’s part of our job as security experts is to reach out, find, nurture and support the experts of tomorrow…