Since 1999

The Rietta Blog

Since 2005, this publication covers a wide range of topics, including cybersecurity, software development, and cloud migration. It’s a valuable resource for anyone interested in staying informed about these areas.

09/21/2022

Top 5 Tips and Tricks on Developing with Docker

A five tips and tricks I've built up working daily with Docker professionally for three years.

Read More »

10/01/2021

You Can be the Victim of a Cybersecurity Attack: Do Your Part. #BeCyberSmart.

Be cyber smart by recognizing that you can be the victim of a cyber security incident and that you have to keep your Internet connected custom software securely configured and patched up-to-date at all times. Do Your Part. #BeCyberSmart.

Read More »

08/31/2021

The Ripples From SolarWinds

The effects of the Solar Winds breach are felt throughout the tech community. More important than the breach though is the aftermath and the response to the incident. How does that affect others?

Read More »

07/21/2021

Dockerizing Development Saves Serious Money for Small Agency

Systematic investment in Docker is paying off big time. From a agency owner's perspective this is why the up front investment was worth it.

Read More »

07/07/2021

Paying Ransomware is Harmful: Invest in proactive defense instead.

Paying the pirates has never been a good idea. The long history shows that paying the ransom only increases the financial incentives for more ransoms. Here is how you can use Threat Actor / Capability modeling and practically free counter measures to protect yourself.

Read More »

06/30/2021

Top 5 Cyber Security Self-Defense Tips for Businesses with Custom Applications

Since there is no Internet coast guard coming to your aid, here are the top five tips for your company to be better prepared for your own self-defense against cyber attack.

Read More »

06/10/2021

Why Rietta Appreciates Diversity

Rietta values diversity because diversity improves team performance.

Read More »

05/25/2021

Cross-site Scripting Injection Attacks Using SVG Images

Cross-Site Scripting attacks can come from a variety of vectors, this article is an explanation of an unusual vector where javascript is embedded within a scalable vector graphics image.

Read More »

05/11/2021

Lava lamps providing randomness for security!

Lava Lamps as a security tool is an old idea, once covered by a patent. This is why I proudly display a Lava Lamp in my office within my web cam shot.

Read More »

04/27/2021

Testing: Your Future Self Will Thank You

Testing, while not always glorious, is a vital part of a good code base. Tests and code should go hand in hand.

Read More »