since 1999

The Rietta Blog

09/26/2022

Case Study: Complex Insurance Document Solution with LibreOffice, Docker, and AWS

How Rietta built a complex document solution that seamlessly deploys to AWS using purely open source technology.

Read More »

09/21/2022

Top 5 Tips and Tricks on Developing with Docker

A five tips and tricks I've built up working daily with Docker professionally for three years.

Read More »

10/01/2021

You Can be the Victim of a Cybersecurity Attack: Do Your Part. #BeCyberSmart.

Be cyber smart by recognizing that you can be the victim of a cyber security incident and that you have to keep your Internet connected custom software securely configured and patched up-to-date at all times. Do Your Part. #BeCyberSmart.

Read More »

08/31/2021

The Ripples From SolarWinds

The effects of the Solar Winds breach are felt throughout the tech community. More important than the breach though is the aftermath and the response to the incident. How does that affect others?

Read More »

07/21/2021

Dockerizing Development Saves Serious Money for Small Agency

Systematic investment in Docker is paying off big time. From a agency owner's perspective this is why the up front investment was worth it.

Read More »

07/07/2021

Paying Ransomware is Harmful: Invest in proactive defense instead.

Paying the pirates has never been a good idea. The long history shows that paying the ransom only increases the financial incentives for more ransoms. Here is how you can use Threat Actor / Capability modeling and practically free counter measures to protect yourself.

Read More »

06/30/2021

Top 5 Cyber Security Self-Defense Tips for Businesses with Custom Applications

Since there is no Internet coast guard coming to your aid, here are the top five tips for your company to be better prepared for your own self-defense against cyber attack.

Read More »

06/10/2021

Why Rietta Appreciates Diversity

Rietta values diversity because diversity improves team performance.

Read More »

05/25/2021

Cross-site Scripting Injection Attacks Using SVG Images

Cross-Site Scripting attacks can come from a variety of vectors, this article is an explaination of an unusual vector where javascript is embedded within a scalable vector graphics image.

Read More »

05/11/2021

Lava lamps providing randomness for security!

Lava Lamps as a security tool is an old idea, once covered by a patent. This is why I proudly display a Lava Lamp in my office within my web cam shot.

Read More »