TL;DR: Try the free demo @ today!

Those in my orbit for the past couple years know that I’ve been working on scaling a bootstrapped startup — Lockdrop Inc.. The phrase “Aiming to launch next week!” is something they’ve heard from my mouth far too many times (if you’re a startup founder, you know how it goes). For better or worse, it’s culminated in the accomplishment of our first major milestone — Lockdrop’s official commercial launch!

How did we get here?

Lockdrop was born out of a personal frustration of mine, trying to share large files or sensitive documents with others. Technology has come a long way since the internet was born…

Sometimes an unfortunate reality.

TL;DR: Yes. Do I recommend it? No. Do you need actual experience in the subject matter area? Of course. Do the exams still validate knowledge? Yes!

Even with our best of intentions, life sometimes gets in the way and things don’t go according to plan. If you’re like me, there’s a million things you’d rather be doing than studying, and so I tell myself, tomorrow, I’ll study tomorrow… and so on, procrastination. Next thing you know, your exam starts in 5 minutes, and you’ve suddenly become the creature in the picture above.

That creature was me yesterday at 9:25 AM… / CC BY-SA 2.0

You may or may not have heard of open-source software ( if you haven’t please skim this), and if you have, your knowledge of the subject may vary considerably from the individual next to you. When it comes to data security and privacy, the arguments for and against the use of open-source software can be quite philosophical and at times heated.

What I want to touch on in this article, is about trust. Trust is a tricky thing, when you trust something you’re inherently giving up some control over your environment, being and “entrusting” it to someone or something else…

There is a lot of talk surrounding the impact a cyber security breach can have on your businesses reputation. I’m going to talk about something a little different. I haven’t seen many professionals talking about the benefits to your reputation that come with having proactive operational security or the damage that’s done by not having it before a breach actually occurs (or doesn’t).

I’d like to lay out a theory I’ve had for some time, and see what you as a reader think. Before we get into it, I want to explain a couple concepts. …


Nowadays it seems like on a weekly basis we’re hearing about one major data breach after another, large companies are having data stolen and in some cases posted online publicly in large volumes. The fact that the majority of stories that end up making the rounds in the media are due to failures at large enterprises can lead some small businesses to think they are too small to be targets of hackers and malicious actors.

Unfortunately, small businesses are targeted just as much as the big guys. …

The other day I was thinking about how I could possibly explain the differences between encryption-in-transit and end-to-end/client-side encryption and show the importance of the latter and the realistic weaknesses of the former. Cue Scarlett Johansson in the movie Lucy (2014).


Back in August of this year, Christopher Mele of The New York Times wrote an article entitled “ Data Breaches Keep Happening, So Why Don’t You Do Something?”. In his article he brought to light a term coined recently, “Breach Fatigue” which could also be referred to as “Data Breach Fatigue”.

Due to an increasing number of large institutions ( Yahoo 3 Billion, Marriot 500M, Equifax 146M, and so many more, even LinkedIn 167M) being affected by data breaches, and the quantity of data being breached, people are becoming numb to the idea of their data being compromised. Given the…

But I thought Linux (and Macs) aren’t affected by Viruses?

Often people ask is Antivirus necessary on Linux systems? The answer is it really depends.

Some may need it for compliance purposes, for example some QSAs (PCI DSS) would consider Linux these days to be commonly affected by malicious software”. Recently I found myself in this exact situation, hence my reason for writing this article.

Other situations might include a Linux server that serves up file-based content to Windows systems, such as a file server, or a mail server that processes email attachments.

In any event, for anyone who has looked into Antivirus solutions for Linux, the options out there…

While it’s fresh…

Today, I wrote and passed the AWS Certified Security — Specialty exam (SCS-C01). While the experience is still fresh in my mind, I want to solidify my thoughts into a format that others can digest. Hopefully this article will help others prepare for this exam, find value in, and achieve the certification.


Everyone’s preparedness going into these certification exams will be different. We all have differing levels of experience with AWS service offerings. …

Aaron Brighton

Founder at Lockdrop | CISSP | AWS-SAP

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store