Month: April 2019

Best Practices for Securing Azure Compute

Best Practices for Securing Azure Compute

Cloud computing delivered through services like Microsoft Azure, and AWS, have delivered a bevy of benefits…

8 ways to achieve agile security

8 ways to achieve agile security

Between 2017 and 2021, worldwide spending on cybersecurity will top $1 trillion, according to predictions…

Effects of automation

Effects of automation

Rapidly increasing automation and digitalisation represent another significant challenge to further job creation. From car…

Securing your Azure Storage accounts

Securing your Azure Storage accounts

Enterprise data is growing exponentially and becoming more complex, making it harder to manage, and…

Introduction to Amazon Machine Learning

Introduction to Amazon Machine Learning

The goal of this post is to introduce you to machine learning – and specifically Amazon…

Best Practices for Securing Azure Compute

Best Practices for Securing Azure Compute

Cloud computing delivered through services like Microsoft Azure, and AWS, have delivered a bevy of benefits…

10 Kubernetes Tutorials you can try today

10 Kubernetes Tutorials you can try today

Since we all like #Kubernetes so much, we thought to share some cool tutorials you…

Adding Continuous Security to your CI/CD pipeline

Adding Continuous Security to your CI/CD pipeline

Today, more enterprises are looking to public cloud, or Infrastructure-as-a-Service (IaaS), to enable the speed and agility…

Do you have leaky S3 buckets?

Do you have leaky S3 buckets?

Last year was the year of “leaky buckets,” as in S3 buckets, making some of…

Securing Azure Virtual Network

Securing Azure Virtual Network

Many enterprises are already reaping the exponential rewards delivered by using Infrastructure as a Service (IaaS), in…