Simple Voice-Command SQL Injection Hack into Alexa Application

[vc_row][vc_column][vc_column_text] Just what we need, another attack vector- Voice-Command SQL Injection Not all web applications are created equal, as each one has different levels of application security measures in place to protect the information or data, as well as access. Unfortunately, the average user of the application has very little knowledge as to the security […]

How To Handle HIPAA Compliance with Serverless Security

[vc_row][vc_column][vc_column_text]It is back to school time, which means if you are a parent with younger children, it is time to fill out countless forms and medical records. I have three children and each one requires about 6 different forms. This process used to take me hours and all I was left with was a sore […]