All blog posts

  • Architecture
  • Detection & response

Lessons in logging: chopping down security risks using audit trails

  • icon Nov 28, 2023
  • by Aditya Mukerjee
  • icon 13 minutes read
  • icon 2705
This post is the first in a series about logging and audit trails from a security perspective. For the next post in the series, see Lessons in Logging, Part 2: Mapping Your Path to a Mature Security Program with Logs and Audit Trails At Latacora, we …
Read more
  • Tooling

Our Approach to Building Security Tooling

  • icon Nov 01, 2023
  • icon 11 minutes read
  • icon 2245
Introduction # Most “security tools” today are typically composed by code that consumes an API and applies predefined logic to identify issues. This is generally accomplished by: Fetching a subset of the endpoints exposed by the service …
Read more
  • Events

Frequently Asked Questions from Strange Loop 2023

  • icon Sep 27, 2023
  • icon 3 minutes read
  • icon 516
The last Strange Loop conference was held September 21-22, 2023 at St. Louis Union Station. The conference is targeted towards developers; the speakers are often sharing their knowledge on new and inventive ways to use technology. At our sponsor …
Read more
  • Infrastructure security

Remediating AWS IMDSv1

  • icon Aug 11, 2021
  • icon 15 minutes read
  • icon 3036
2024-12-17 Updated to include Declarative Policies Compute resources in AWS (for example, EC2 instances, ECS tasks/services, etc.) get access to AWS credentials, such as temporary instance role credentials, via the Instance Metadata Service (IMDS). …
Read more
  • Sales enablement
  • Risk & compliance

The SOC2 starting seven

  • icon Mar 12, 2020
  • icon 17 minutes read
  • icon 3603
So, you plan to sell your startup’s product to big companies one day. Congratu-dolences! Really, that’s probably the only reason you should care about this article. If that’s not you, go forth and live your life! We’ll ask no more of your time. For …
Read more
  • Cryptography

Stop using encrypted email

  • icon Feb 19, 2020
  • icon 8 minutes read
  • icon 1698
Email is unsafe and cannot be made safe. The tools we have today to encrypt email are badly flawed. Even if those flaws were fixed, email would remain unsafe. Its problems cannot plausibly be mitigated. Avoid encrypted email. Technologists hate this …
Read more