What’s Next for Cloud Security
If you care about computer security, you take steps to secure systems under your direct control. Typically, this means you adjust settings to require multi-factor authentication, encrypt data...
If you care about computer security, you take steps to secure systems under your direct control. Typically, this means you adjust settings to require multi-factor authentication, encrypt data...
Andy Wolber | Dec 16
Nearly every technology leader encounters “shadow” technology adoption at some point. Also known as “unapproved IT” or “rogue IT”, shadow IT might be a social media management app adopted in...
Andy Wolber | Sep 15
A virtual private network — most often referred to as a VPN — seeks to secure network traffic between a device and the VPN service. Once the VPN connection is established, network requests appear...
Andy Wolber | Sep 10
BeyondCorp is the hot new tool to protect yourself and your company from hacking. But getting started might seem a bit daunting. This post shall share information with readers on how to get...
Dominik Kugelmann | Sep 1
We publish new articles every week