Discussing technologies and controls deployed to protect data, applications, and the associated infrastructure.
Is IoT Safe for your Business?
Back in January I wrote a post on IoT and the year ahead. I suspect the past few weeks’ activities have given IoT somewhat more press than my humble ramblings. Pretty much no one escaped the news that there have been some interesting new variants on the good old fashioned Distributed Denial of Service (DDoS), […]
Public Cloud: Definitely More Secure Than Your Own Datacentre
Headline too strong for you? Well, it was inspired by a couple of conversations this week that took me back in time to 2011 when I first joined Cloudreach, and the business world was a little more suspicious of cloud security.
Ahead of the Hackers: A Guide to Offensive Security with Free Tools and Tips
The advent of new IT environments and cloud adoption has brought about the new challenge of how to defend it from potential threats and malicious use. In this post we’ll offer you some insight into free security scanning tools that will help you to protect your systems, giving some Cloudy advice along the way.
A How-To Guide for Preparing your Cyber Incident Response Program
It’s Security Awareness Week at Cloudreach, and we’re bringing you a special guest blog post from our Partner Alert Logic!
Security – It’s a Scary World Out There
Now there’s a doom mongering headline, eh? Well, it’s true so I make no apology for it. It’s been nearly a year since I last wrote on the subject of security (“How Secure is your data”), but having been to visit our partners Alert Logic recently, I was motivated to jot down a few further […]
How Secure is your Data?
Who owns security? Let’s start with a simple question: Who is responsible for security in your business? Not sure? Well, then it could be you…. Sweating yet? Even if it isn’t you, whatever your role, you have a part to play in keeping your business safe.