<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Securosis</title><link>/</link><description>Recent content on Securosis</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Sun, 22 Mar 2026 00:00:00 +0000</lastBuildDate><atom:link href="/index.xml" rel="self" type="application/rss+xml"/><item><title>AI Will Accelerate Your Tech Debt</title><link>/blog/ai-will-accelerate-your-tech-debt/</link><pubDate>Sun, 22 Mar 2026 00:00:00 +0000</pubDate><guid>/blog/ai-will-accelerate-your-tech-debt/</guid><description>&lt;h2 id="the-tech-debt-crisis-is-coming"&gt;The Tech Debt Crisis Is Coming&lt;/h2&gt;
&lt;p&gt;Like the American middle class living paycheck to paycheck, organizations near or below the security poverty line are one big incident away from catastrophic bankruptcy. They got here through years of underinvesting in core capabilities and unified architecture, not stupidity, but a long series of decisions that prioritized shipping over sustainability. And now every smaller incident consumes the cycles that could have gone toward paying down that debt, making the hole deeper every time.&lt;/p&gt;</description></item><item><title>Defining Security Invariants</title><link>/research/howto/security-invariants/</link><pubDate>Thu, 09 Jan 2025 17:00:00 +0000</pubDate><guid>/research/howto/security-invariants/</guid><description>&lt;p&gt;&lt;em&gt;&lt;strong&gt;Note:&lt;/strong&gt; This post has been revised to include the new capabilities released by AWS prior to re:Invent 2024.&lt;br&gt;
You can also check out the re:Invent presentation we did with Securosis: &amp;ldquo;Security invariants: From enterprise chaos to cloud order&amp;rdquo; &lt;a href="DEV401_Security-invariants-From-enterprise-chaos-to-cloud-order.pdf"&gt;slides&lt;/a&gt; - &lt;a href="https://www.youtube.com/watch?v=aljwG4N5a-0"&gt;video&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;</description></item><item><title>The Universal Cloud Threat Model</title><link>/research/papers/the-universal-cloud-threat-model-for-cloud-native-security/</link><pubDate>Tue, 23 Apr 2024 00:00:00 +0000</pubDate><guid>/research/papers/the-universal-cloud-threat-model-for-cloud-native-security/</guid><description>&lt;p&gt;The Universal Cloud Threat Model is a collaboration between &lt;a href="https://www.primeharbor.com/"&gt;PrimeHarbor Technologies&lt;/a&gt; and Securosis. It is a cloud-centric threat model to help organizations focus security efforts on the most-common attacks most organizations will experience. The UCTM is designed as an adjunct to other threat models.&lt;/p&gt;</description></item><item><title>Free Training with Cloud Security Lab a Week!</title><link>/cloudslaw/</link><pubDate>Mon, 01 Jan 2024 00:00:00 +0000</pubDate><guid>/cloudslaw/</guid><description>&lt;p&gt;Cloud Security Lab a Week (CloudSLAW) delivers a free 15-30 minute high-quality training lab into your inbox once a week. You don’t need to know much of anything about either security or cloud to get started, so hop on in and go from Zero to Hero (not that we’re saying you are a zero, but… )&lt;/p&gt;</description></item><item><title>The Securosis Team</title><link>/about/team/</link><pubDate>Mon, 01 Jan 2024 00:00:00 +0000</pubDate><guid>/about/team/</guid><description>&lt;h2 id="rich-mogull-researcher--ceo"&gt;Rich Mogull, Researcher &amp;amp; CEO&lt;/h2&gt;
&lt;p&gt;Rich has twenty years experience in information security, physical security, and risk management. He specializes in data security, application security, emerging security technologies, and security management. Prior to founding Securosis, Rich was a Research Vice President at Gartner on the security team where he also served as research co-chair for the Gartner Security Summit. Prior to his seven years at Gartner, Rich worked as an independent consultant, web application developer, software development manager at the University of Colorado, and systems and network administrator. Rich is the Security Editor of TidBITS, a monthly columnist for Dark Reading, and a frequent contributor to publications ranging from Information Security Magazine to Macworld. He is a frequent industry speaker at events including the RSA Security Conference and DefCon, and has spoken on every continent except Antarctica (where he&amp;rsquo;s happy to speak for free – assuming travel is covered).&lt;/p&gt;</description></item><item><title>Totally Transparent Research</title><link>/about/totally-transparent-research/</link><pubDate>Mon, 01 Jan 2024 00:00:00 +0000</pubDate><guid>/about/totally-transparent-research/</guid><description>&lt;p&gt;Totally Transparent Research is the embodiment of how we work at Securosis. It’s our core operating philosophy, our research policy, and a specific process. We initially developed it to help maintain objectivity while producing licensed research, but its benefits extend to all aspects of our business.
Going beyond Open Source Research, and a far cry from the traditional syndicated research model, we think it’s the best way to produce independent, objective, quality research.
Here’s how it works:&lt;/p&gt;</description></item><item><title>Training</title><link>/services/training/</link><pubDate>Mon, 01 Jan 2024 00:00:00 +0000</pubDate><guid>/services/training/</guid><description/></item><item><title>Cloud Security Project Accelerators</title><link>/services/project-accelerators/</link><pubDate>Tue, 19 Dec 2023 00:00:00 +0000</pubDate><guid>/services/project-accelerators/</guid><description/></item><item><title>Custom Research and Consulting</title><link>/services/custom-research-and-consulting/</link><pubDate>Mon, 18 Dec 2023 00:00:00 +0000</pubDate><guid>/services/custom-research-and-consulting/</guid><description/></item><item><title>Deploying AWS Backup</title><link>/research/howto/awsbackup/</link><pubDate>Tue, 05 Sep 2023 09:23:37 -0400</pubDate><guid>/research/howto/awsbackup/</guid><description>&lt;p&gt;tl;dr - here is a &lt;a href="https://github.com/primeharbor/pht-awsbackup-management"&gt;link to the scripts&lt;/a&gt;&lt;/p&gt;
&lt;h2 id="what-ransomware-in-aws-looks-like"&gt;What Ransomware in AWS looks like&lt;/h2&gt;
&lt;p&gt;In a typical ransomware attack, a threat actor will attempt to encrypt files on critical machines belonging to the victim. In exchange for a cryptocurrency payment, the threat actor will provide the decryption key and software to the victim, who then has to go through the arduous process of restoring their machines. The encrypted data is typically lost forever if the victim refuses to pay the ransom.&lt;/p&gt;</description></item><item><title>Leveraging AWS SSO (aka Identity Center) with Google Workspaces - version 2</title><link>/research/howto/aws-identity-center-google-v2/</link><pubDate>Sun, 25 Jun 2023 18:25:26 -0400</pubDate><guid>/research/howto/aws-identity-center-google-v2/</guid><description>&lt;blockquote&gt;
&lt;p&gt;This is a revised version of the original post &lt;a href="blog/aws-identity-center-google/"&gt;Leveraging AWS SSO (aka Identity Center) with Google Workspaces&lt;/a&gt; based on the new announcement &lt;a href="https://aws.amazon.com/about-aws/whats-new/2023/06/aws-iam-identity-center-automated-user-provisioning-google-workspace/"&gt;AWS IAM Identity Center now supports automated user provisioning from Google Workspace&lt;/a&gt; The original post is still valid, and in someways may be better, but this version has it&amp;rsquo;s own advantages.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Setting up &lt;a href="https://aws.amazon.com/iam/identity-center/"&gt;AWS IAM Identity Center (successor to AWS Single Sign-On)&lt;/a&gt;, hereafter called AWS SSO (because I have to pay AWS for egress on this site), is an excellent service to help you get rid of IAM users and enforce identity best practices around second-factor authentication, on and off-boarding employees, and assigning the right level of access depending on job function.&lt;/p&gt;
&lt;p&gt;Companies using Google Workspaces for email and collaboration can also leverage their Google accounts to access AWS via AWS SSO. The process isn&amp;rsquo;t clearly documented, and the provisioning support isn&amp;rsquo;t integrated, so here is a post to help you set it all up.&lt;/p&gt;</description></item><item><title>Leveraging AWS SSO (aka Identity Center) with Azure AD</title><link>/research/howto/aws-identity-center-azuread/</link><pubDate>Tue, 16 May 2023 20:33:45 -0400</pubDate><guid>/research/howto/aws-identity-center-azuread/</guid><description>&lt;p&gt;Setting up &lt;a href="https://aws.amazon.com/iam/identity-center/"&gt;AWS IAM Identity Center (successor to AWS Single Sign-On)&lt;/a&gt; henceforth called AWS SSO (because AWS charges for egress), is an excellent service to help you get rid of IAM users and enforce identity best practices around second-factor authentication, on and off-boarding employees, and assigning the right level of access depending on job function.&lt;/p&gt;</description></item><item><title>Data Breaches and Encryption</title><link>/research/presentations/data-breaches-and-encryption/</link><pubDate>Tue, 16 Jun 2009 00:00:00 +0000</pubDate><guid>/research/presentations/data-breaches-and-encryption/</guid><description>&lt;p&gt;Presentation on &lt;a href="https://cdn.securosis.com/assets/library/presentations/Data_Breaches_and_Encryption-PDF.pdf"&gt;Data Breaches and Encryption&lt;/a&gt;.&lt;/p&gt;</description></item><item><title>The 100th Post, and a Note to My Editor</title><link>/blog/the-100th-post-and-a-note-to-my-editor/</link><pubDate>Sat, 11 Nov 2006 00:00:00 +0000</pubDate><guid>/blog/the-100th-post-and-a-note-to-my-editor/</guid><description>&lt;p&gt;It&amp;rsquo;s hard to believe this little side project has hit 100 posts. We&amp;rsquo;re averaging 600+ unique visitors a day, which isn&amp;rsquo;t bad for a blog that&amp;rsquo;s only been around for three months, and even hit the front page of &lt;a href="http://digg.com"&gt;Digg&lt;/a&gt; once.&lt;/p&gt;</description></item></channel></rss>