High Level Security Considerations for Popular Cloud Usage Strategies Cloud - Feb 2, 2022 AWS provides a wide range of services, from compute and storage to network infrastructure and security management. The comprehensive set of services gives users the ability to quickly, efficiently and consistently scale web services on a reliable platform, without the maintenance and costs associated with managing the underlying hardware. The services offered can typically be […] read more
What is a Cyber Attack? Cloud - Jan 1, 2022 What is a Cyber Attack? A cyber attack refers to an action designed to target a computer or any element of a computerized information system to change, destroy, or steal data, as well as exploit or harm a network. Cyber attacks have been on the rise, in sync with the digitization of business that has […] read more
Tackling OWASP Top 10 with AWS WAF Cloud - Jan 1, 2022 I know what you’re thinking. That is a lot of acronyms. Let’s break down the problem we’re tackling. The Open Web Application Security Project is an online community that produces freely-available articles, methodologies, documentation, tools, and technologies in the field of web application security. The OWASP Top 10 is a document aimed at development and […] read more
Optimizing AWS Costs Cloud - Dec 12, 2021 This article will specifically highlight various strategies for optimizing costs in AWS. Complex multi-cloud environments are becoming commonplace, and billing details vary dramatically by provider. It’s not uncommon for Amazon Web Services (AWS) customers to receive higher-than-anticipated bills for cloud services. While this might be expected when organizations first migrate workloads to AWS, it can […] read more
Beware of these Security Vulnerabilities in Azure Cloud - Dec 12, 2021 When developing, deploying, or migrating IT assets into the cloud, what responsibilities fall on the cloud provider and what are yours to consider? Popular cloud providers like Amazon Web Services (AWS) and Microsoft Azure (Azure) provide security features within their services but often time their default configuration settings should be customized to your environment. […] read more
Top Ten Cyber Security Best Practices Cloud - Nov 11, 2021 Introduction As governments across the world set out to develop comprehensive data standards, navigating complex compliance frameworks can become increasingly cumbersome. For organizations within regulated industries, correctly handling sensitive data is crucial. While compliance may seem simple, the process by which an organization goes about this is often misunderstood and futile. As companies look to […] read more
Managing Costs in the Cloud Cloud - Nov 11, 2021 As you increase your cloud presence, how are you ensuring a process to manage and optimize cloud costs? Gartner estimates that roughly 80% of organizations overshot their infrastructure as a service (IaaS) budgets in 2020. This likely stemmed from mismanaged cloud spending, weak cloud governance, and a lack of cost optimization. As organizations look to […] read more
Designing a secure cloud architecture Cloud - Oct 10, 2021 Designing a secure cloud architecture Reports of cloud security breaches are becoming more prevalent among mainstream media channels, however they are often framed with vague explanations. The often sensationalised descriptions of the perpetrators and the ambiguity of the underlying concepts and technologies may lead organizations to believe that adopting the cloud is an overwhelming task, […] read more