Last Updated on 18 Aug. 2016, Total: 19 Articles and Tutorials

  1. All Clouds are not Created Equal: The Personal Cloud in the Corporate World (Part 1)

    This article takes a look at how the personal cloud works in the corporate world... Read More

  2. All Clouds are not Created Equal: The Personal Cloud in the Corporate World (Part 2)

    This article looks at the down side of “dual persona” or “containerization” solutions designed to create isolated environments for work and personal apps and data... Read More

  3. BYOS: Bring Your Own Security

    Love it or hate it, BYOD (Bring Your Own Device) seems to be here to stay, at least for the foreseeable future... Read More

  4. Cloud Security Prospects for 2015

    In this article will consider the likely advancements we should see in cloud security through this year... Read More

  5. Cloud Security: You Can Never Stand Still

    Cloud security is not a new topic - but it’s one that remains both under the microscope and in the headlines. There’s good reason for that, given the proven risks of cyber attacks in and from the cloud... Read More

  6. Common Misunderstandings regarding Security and Cloud Compute

    Security is a concerning factor when computing in the cloud and rightfully so, however there are some misconceptions regarding security threats as well. In this article we will try to filter through the unfounded concerns, to help reduce misperceptions so that more focus can be placed on addressing cloud security threats that should be prioritised, ones that are actually real,... Read More

  7. Considerations for Running Security Software in the Cloud

    One aspect of the transition to the cloud that is sometimes overlooked is that security software that you may take for granted could behave very differently in a cloud environment. As such, administrators must consider what impact the cloud will have on their security infrastructure... Read More

  8. DDoS Attacks Still Run Rampant Across the Web

    In a perfect world, network managers would never have to experience application performance problems or deal with security issues. However, today’s networking environments are anything but perfect – they are open to attack, traffic surges and a plethora of other problems. Yet, end users (and customers) demand perfect availability, perfect security and perfect performance... Read More

  9. How to Use Azure MFA (Multi-Factor Authentication)

    One of the big concerns for both small businesses and enterprises, when moving to the cloud, is security. We all know that the traditional username-and-password method of authenticating logons is woefully lacking in a world where resources available over the Internet are constantly under attack. If an attacker can steal, guess or socially engineer a user into voluntarily revealing a... Read More

  10. IDaaS: The changing World of IAM

    In this article we consider how Identity and Access Management is changing through the emerging cloud-based alternative IDaaS... Read More