• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer
RKON

RKON

Private Equity Services

  • About RKON
    • Our Team
    • Our Philosophy
    • Our Partners
    • Testimonials
    • Careers
  • Resources
        • Articles
        • Case Studies
        • Podcasts
        • Video Testimonials
        • Events and Webinars
        • White Papers
        • Datasheets
  • Private Equity
        • Featured

          Project Ransom: Manufacturer Stops Loss of $1M/Day After Security Breach

        • Technology Advisory
          • Artificial Intelligence
          • Due Diligence
          • 100 Day Plan
          • IT Roadmap
          • IT Security & Compliance
          • IT Diagnostic
          • Portfolio Security Assessment
          • Software Engineering
        • Mergers & Acquisitions
          • Carve-Out
          • Platform Creation
          • Post-Merger Integration
  • Enterprise Services
        • IT Advisory
          • Cloud Infrastructure
          • Cloud Journey Roadmap
          • IT Roadmap
          • IT Diagnostic
        • IT Execution
          • Modern Workplace
          • IT Transformation
          • Cloud Migration
          • Microsoft Azure Migration
          • Software Engineering
        • Managed Services
          • IT Help Desk
          • Compliant Cloud
          • Microsoft Azure Management
        • Security Services
          • vCISO
          • Security Assessment
          • Managed Detection Response
          • Security Breach Recovery
          • Cloud Security
          • Identity & Access Management (IAM)
          • Governance Risk & Compliance (GRC)
          • Zero Trust
          • Penetration Testing
  • Contact Us

AWS

SSH Authentication with AuthorizedKeysCommand

Imagine a world where adding or removing a user’s SSH access was as simple as a single button in AWS. [...]

GKE Workload Identity

Traditionally, there have been security challenges with the methods used for Kubernetes workloads running on GKE authenticating to Google Cloud [...]

VPC Service Controls in Plain English

Google Cloud Platform (GCP) offers powerful security controls to mitigate API-based data exfiltration called VPC Service Controls. To execute a [...]

Exploit SSRF to gain AWS Credentials

In the cloud, it’s common to implement decoupled components that integrate and process client data transparently. Without adequate security controls [...]

RKON is now working with customers and ISVs in Microsoft Marketplace

Microsoft customers worldwide can now work with RKON to take advantage of the Microsoft commercial marketplace to increase efficiency, buy confidently, and [...]

MCP Server Security: Navigating the New AI Attack Surface

Just as the rise of cloud computing forced a rethink of perimeter-based security, the adoption of large language models (LLMs) [...]

GitHub Actions on AWS: How to Implement Identity Federation

Configuring OIDC for GitHub Actions on AWS GitHub Actions offers a feature that allows workflows to generate signed OpenID Connect [...]

Assured Workloads in Google Cloud Platform

What is Google Cloud Platform’s Assured Workloads? Google Cloud Platform’s (GCP) Assured Workloads provides a way for control packages to [...]
  • Page 1
  • Page 2
  • Go to Next Page »

Primary Sidebar

Recent Posts

  • SSH Authentication with AuthorizedKeysCommand
  • GKE Workload Identity
  • VPC Service Controls in Plain English
  • Exploit SSRF to gain AWS Credentials
  • RKON is now working with customers and ISVs in Microsoft Marketplace

Want more insights?

Subscribe to our email newsletter for news and updates

  • Home
  • About RKON
  • Resources
  • Industries
  • Private Equity
  • Enterprise Services
  • Contact Us
  • RKON’S Digital Privacy

Footer

RKON transparent logo
Find Us on YouTube Find Us on Facebook Find Us on LinkedIn Find Us on Twitter
(312) 654-0300 328 S Jefferson Street #450, Chicago IL, 60661

Subscribe to our email newsletter for news and updates

We use cookies to offer you a better experience and analyze site traffic. By continuing to use this website, you consent to the use of cookies in accordance with our Privacy Policy.