You’re off to the cloud, and the first thing you run into before you can reach altitude is a wall. That wall is your organization’s security requirements. Fortunately, it’s easy to break through that wall when you understand how security works in the cloud. The Model We’re lucky because the model for security in any…
Read MoreVirtualization is all about improving IT operational efficiency. It’s the prospect of doing more with less, of becoming more agile as an IT function and as an organization, which has turned this market into the multi-billion dollar one it is today. Gartner forecasted a couple of years back…
Read MoreCloud-based applications have continued to grow exponentially. The majority of people are now interacting with cloud-based data and applications in one way or another, likely through social media such as Facebook, LinkedIn, etc. This comfort level is extending to business applications as well. IT and security professionals…
Read MoreRemember the days when you had to provision servers manually? All that time and resource devoted to a hugely inefficient and error-strewn IT process. Then server virtualization came along, effectively abstracting the servers from the hardware, and we’ve never looked back. Now new virtualization technologies are appearing…
Read MoreSpeak to any IT manager today, and they’ll tell you they’re on a journey: a journey from a physical environment to virtualized and cloud environments. With no two IT environments the same, they’ll all be at a different stage of this journey, but the stats speak for themselves….
Read More
If you’re moving your computing needs to Azure, security is probably one of your top concerns. I’ve written about this before, so I’ll assume you’ve already read it. If not, it’s worth taking a few minutes to get a grounding. Operations Once you’ve got a solid understanding of the security model in place on Azure,…
Read MoreI’m a nerd at heart, and – let’s face it – in action, but I do make an effort to review the materials that our non-technical teams publish. There’s a lot of great information there even if it isn’t in hex or binary. This week, I was reading through a case study for a partner…
Read More
Updated, 20-Jun @ 6:22pm To say that this continues to be a really bad week for the Code Spaces team is a massive understatement. After gaining access to their administrative credentials, an attacker managed to quickly and easily wipe out their entire business. Both production and backup data was destroyed. Steve Ragan has a great…
Read More
Encryption has always been a central concern for the cybersecurity community, but it has taken on added importance following the 2013 revelations of widespread Internet surveillance by world governments and intelligence agencies.
Read More
Many organizations are gradually setting aside their reservations about cloud security and storing more company data to the cloud, but security risks remain.
Read More