Search Results for: cloud computing Blog Post Here are The Top Cybersecurity Risks in Cloud Computing March 10, 2021 In the past few years, the demand for cloud computing has increased dramatically. However, the transition to the cloud has... Blog Post How to mitigate your cloud computing risks December 4, 2019 We have come across individuals working at companies of all different sizes, knowledge levels, and specialties from all different places... Blog Post Microsoft Issued a Warning to Its Azure Customers of a Flaw That Might Allow Hackers to Access Data September 23, 2021 On September 8, 2021, Microsoft issued a warning to its Azure customers) cloud computing customers) of a vulnerability. In essence,... Blog Post Moving Your Business to the Cloud? Cybercriminals are Hot on Your Heels October 13, 2021 Although cloud adoption has been an inevitable imperative for some time and a driving force in changing how businesses operate,... Blog Post Understanding shared responsibility models in the cloud July 16, 2021 We are becoming increasingly dependent on cloud services for specialized technology solutions as well as to facilitate day-to-day operations in... Blog Post Common Cloud Vulnerabilities May Put Your Data at Risk March 17, 2020 In the past few years, the focus of enterprises on cloud computing has been a simple transition. However, as IT... Blog Post The Plight of Fake Android Apps for Crypto Mining Services That Steal Money August 20, 2021 Cryptocurrency enthusiasts are being cautioned worldwide to be wary of Android apps that promise to mine Bitcoins over the cloud.... Blog Post Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions... Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program... Blog Post Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures... Blog Post Cybersecurity in Smart Cities February 11, 2020 What Is Smart City? A smart city can effectively integrate and utilize the city’s resources and further improve the city’s... Blog Post Microsoft’s Multi-Factor Authentication Failure Impacts Office 365 Users Globally November 19, 2018 A failure of Microsoft’s multi-factor authentication services has impacted Office 365 business users in the early hours of Monday. The... Knowledge Center Cloud Computing Security White Paper June 17, 2017 Cloud Computing As technology continues to advance and transform business functions, more companies are choosing to transfer their data into... Blog Post Data Breach Hits Timehop, Compromises 21 Million Users’ Data July 9, 2018 Timehop, a popular application that reclaims old photos and posts by syncing to social media profiles has revealed a data... Blog Post The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We...
Blog Post Here are The Top Cybersecurity Risks in Cloud Computing March 10, 2021 In the past few years, the demand for cloud computing has increased dramatically. However, the transition to the cloud has...
Blog Post How to mitigate your cloud computing risks December 4, 2019 We have come across individuals working at companies of all different sizes, knowledge levels, and specialties from all different places...
Blog Post Microsoft Issued a Warning to Its Azure Customers of a Flaw That Might Allow Hackers to Access Data September 23, 2021 On September 8, 2021, Microsoft issued a warning to its Azure customers) cloud computing customers) of a vulnerability. In essence,...
Blog Post Moving Your Business to the Cloud? Cybercriminals are Hot on Your Heels October 13, 2021 Although cloud adoption has been an inevitable imperative for some time and a driving force in changing how businesses operate,...
Blog Post Understanding shared responsibility models in the cloud July 16, 2021 We are becoming increasingly dependent on cloud services for specialized technology solutions as well as to facilitate day-to-day operations in...
Blog Post Common Cloud Vulnerabilities May Put Your Data at Risk March 17, 2020 In the past few years, the focus of enterprises on cloud computing has been a simple transition. However, as IT...
Blog Post The Plight of Fake Android Apps for Crypto Mining Services That Steal Money August 20, 2021 Cryptocurrency enthusiasts are being cautioned worldwide to be wary of Android apps that promise to mine Bitcoins over the cloud....
Blog Post Security Information and Event Management Series Part 2: Types of SIEM solutions October 26, 2020 In the first part of this four-part series, we covered the need for Security Information and Event Management (SIEM) solutions...
Blog Post How To Protect Against Adversarial Machine Learning June 11, 2021 Many industries like finance, health care, and transportation now use Machine Learning (ML) in their business models. These sectors program...
Blog Post Backup Policy vs Backup Plan vs Backup Procedure August 27, 2020 Modern-day enterprises implement a flurry of security measures to protect their IT infrastructure from ever-evolving threats. These security measures...
Blog Post Cybersecurity in Smart Cities February 11, 2020 What Is Smart City? A smart city can effectively integrate and utilize the city’s resources and further improve the city’s...
Blog Post Microsoft’s Multi-Factor Authentication Failure Impacts Office 365 Users Globally November 19, 2018 A failure of Microsoft’s multi-factor authentication services has impacted Office 365 business users in the early hours of Monday. The...
Knowledge Center Cloud Computing Security White Paper June 17, 2017 Cloud Computing As technology continues to advance and transform business functions, more companies are choosing to transfer their data into...
Blog Post Data Breach Hits Timehop, Compromises 21 Million Users’ Data July 9, 2018 Timehop, a popular application that reclaims old photos and posts by syncing to social media profiles has revealed a data...
Blog Post The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We...