The Rietta Blog
Since 2005, this publication covers a wide range of topics, including cybersecurity, software development, and cloud migration. It’s a valuable resource for anyone interested in staying informed about these areas.
09/21/2022
Top 5 Tips and Tricks on Developing with Docker
by Frank Rietta
A five tips and tricks I've built up working daily with Docker professionally for three years.
10/01/2021
You Can be the Victim of a Cybersecurity Attack: Do Your Part. #BeCyberSmart.
by Frank Rietta
Be cyber smart by recognizing that you can be the victim of a cyber security incident and that you have to keep your Internet connected custom software securely configured and patched up-to-date at all times. Do Your Part. #BeCyberSmart.
08/31/2021
The Ripples From SolarWinds
by Wren Steitle
The effects of the Solar Winds breach are felt throughout the tech community. More important than the breach though is the aftermath and the response to the incident. How does that affect others?
07/21/2021
Dockerizing Development Saves Serious Money for Small Agency
by Frank Rietta
Systematic investment in Docker is paying off big time. From a agency owner's perspective this is why the up front investment was worth it.
07/07/2021
Paying Ransomware is Harmful: Invest in proactive defense instead.
by Frank Rietta
Paying the pirates has never been a good idea. The long history shows that paying the ransom only increases the financial incentives for more ransoms. Here is how you can use Threat Actor / Capability modeling and practically free counter measures to protect yourself.
06/30/2021
Top 5 Cyber Security Self-Defense Tips for Businesses with Custom Applications
by Frank Rietta
Since there is no Internet coast guard coming to your aid, here are the top five tips for your company to be better prepared for your own self-defense against cyber attack.
06/10/2021
Why Rietta Appreciates Diversity
by Kelly Bard
Rietta values diversity because diversity improves team performance.
05/25/2021
Cross-site Scripting Injection Attacks Using SVG Images
by Christopher Davis
Cross-Site Scripting attacks can come from a variety of vectors, this article is an explanation of an unusual vector where javascript is embedded within a scalable vector graphics image.
05/11/2021
Lava lamps providing randomness for security!
by Frank Rietta
Lava Lamps as a security tool is an old idea, once covered by a patent. This is why I proudly display a Lava Lamp in my office within my web cam shot.
04/27/2021
Testing: Your Future Self Will Thank You
by Wren Steitle
Testing, while not always glorious, is a vital part of a good code base. Tests and code should go hand in hand.