Cloud Security Tools: What You Need to Be Compliant and Secure

When picking what security tools you need to secure your cloud application, you’ll soon find out that there are an enormous amount of options. There are hundreds, possibly thousands, of quality security tools in existence, many of which have different responsibilities. Since securing a cloud computing deployment is complex and there are many tools out […]

View More

On-Premise to Cloud Migration: Advanced Strategies and Pitfalls to Avoid

For any organization considering its first venture into on-premise to cloud migration of data and legacy applications, management will find no shortage of introductory literature on the subject. The problem, however, is that much of the existing literature is just that – an introduction.  It tends to take the form of generalized overviews, summaries of […]

View More

Budgeting for Cloud Security

Are you budgeting for cloud security? Learn what cloud-related budgeting factors you need to keep in mind as you start to plan for the next fiscal year.

View More

Security in the Public Cloud

No matter which CSP you decide is best for your environment, it’s important that you as the client understand your role in the Shared Responsibility model and subscribe to it. AWS, Azure and GCP all have their own versions of several security tools to help you with your half of the shared responsibility model—i.e., protecting your data that resides in their cloud infrastructure. That’s great. But in a world plagued with DevOps, cybersecurity talent shortages, alert and tool fatigue, and increasing cybersecurity threats, simply turning on these tools isn’t enough to achieve security. It’s up to developers to decide how to use those security tools appropriately and operationalize security within your environment.

View More

Best Path for Cloud Migration: Lift & Shift Part 1

As discussed in our recent blog, “Moving Sucks: 5 Easy Steps for a Painless Cloud Migration,” moving your assets to the cloud doesn’t have to be a headache, but it does take planning and decision making prior to doing so. One major decision to make is choosing your migration path – “lift and shift” or “re-deploy/re-architect” – this blog will cover both paths, pro’s/con’s, and how to determine which path is best for your environment.

View More

Social Media + Cybersecurity

The information your organization shares on social media can put your company at risk. Make sure you know common risk scenarios and what you can do to share safely.

View More