Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Technology

Post-perimeter security 101: Dawn of a borderless world

The perimeter has disappeared. Employees work from anywhere in the world and their devices access corporate data from cloud services outside of traditional security perimeters. Securing data in the post-perimeter world requires organisations to enforce their endpoints and establish continuous conditional access to data based on risk. Aaron Cockerill, Chief Strategy Officer at Lookout discusses how to effectively shift security to your mobile endpoints to protect your company’s sensitive data.

A Multi-Million Dollar Commitment to Our Multi-Cloud Strategy

Every business today is growing in their own unique way. Their infrastructure is made up of a combination of cloud and on-premises repositories. Their application suite is custom built with a myriad of productivity applications like Slack, Office 365, Zoom, and more. And finally, their users are working on a wide range of devices, from Apple iPhones to Microsoft Surface Pros. The common theme amongst businesses is their need for flexibility.

AWS System Manager And The Dangers of Default Permissions

In September of 2018, Amazon Web Services (AWS) announced the addition of the Session Manager to the AWS Systems Manager. The session manager enables shell or remote desktop level access to your AWS EC2 Windows and Linux instances, along with other benefits. This is a great new feature, but care should be taken when enabling this capability.

Sysdig and IBM to collaborate on IBM Cloud Private & IBM Multicloud Manager container monitoring and security

Today at Think 2019 we’re announcing our intent to work with IBM to support the Sysdig Cloud-Native Intelligence Platform on IBM Cloud Private and IBM Multicloud Manager. By supporting IBM Multicloud Manager and IBM Cloud Private, Sysdig will help IBM customers accelerate the transition to cloud architectures.

Securing Your Business' Cloud

As you plan to leverage cloud-based IT resources, you must first extensively analyze and evaluate the different risks associated with using such a disruptive technology like cloud computing. In many cases, business' inability to protect their data stored in the cloud is often a direct outcome of needlessly complicating the cloud security thought process.

Enhancing Egnyte for AWS Solution

Trends in computing shift back and forth like the ebb and flow of a tide. Before personal computers became household appliances, centralized computing from a client-server approach was the norm. However, widespread distribution of desktop machines lead to a change in office productivity; decentralization. People began saving their files on the same, inexpensive devices they worked from, while simultaneously using these machines to run an array of applications.