Discussing technologies and controls deployed to protect data, applications, and the associated infrastructure.
Blockchain Technology – Disrupt everything
Blockchain Technology – Disrupt everything I hate the word “disrupt.” It drives the implication that an entire industry is capable of being interrupted or completely tossed on its head. Instead I substitute that word — I prefer to think of it as an evolution. Netflix didn’t disrupt watching movies and tv, they evolved that experience […]
AWS KMS Envelope Encryption
Today the Cloudreach blog covers a topic that is hot, hot, hot given the continuing security breaches, challenges and discussions around the globe. Specifically, we’re going to talk about encryption in AWS and how to make AWS Key Management Service (KMS) secure for your needs. The functionality that KMS provides is great, and with a […]
What the AWS Outage Teaches Us About the Shared Responsibility Model
It was essentially a fat finger on the command line. Everyone in IT has done it at one point in their career.
Is IoT Safe for your Business?
Back in January I wrote a post on IoT and the year ahead. I suspect the past few weeks’ activities have given IoT somewhat more press than my humble ramblings. Pretty much no one escaped the news that there have been some interesting new variants on the good old fashioned Distributed Denial of Service (DDoS), […]
Public Cloud: Definitely More Secure Than Your Own Datacentre
Headline too strong for you? Well, it was inspired by a couple of conversations this week that took me back in time to 2011 when I first joined Cloudreach, and the business world was a little more suspicious of cloud security.
Ahead of the Hackers: A Guide to Offensive Security with Free Tools and Tips
The advent of new IT environments and cloud adoption has brought about the new challenge of how to defend it from potential threats and malicious use. In this post we’ll offer you some insight into free security scanning tools that will help you to protect your systems, giving some Cloudy advice along the way.
A How-To Guide for Preparing your Cyber Incident Response Program
It’s Security Awareness Week at Cloudreach, and we’re bringing you a special guest blog post from our Partner Alert Logic!
Security – It’s a Scary World Out There
Now there’s a doom mongering headline, eh? Well, it’s true so I make no apology for it. It’s been nearly a year since I last wrote on the subject of security (“How Secure is your data”), but having been to visit our partners Alert Logic recently, I was motivated to jot down a few further […]
How Secure is your Data?
Who owns security? Let’s start with a simple question: Who is responsible for security in your business? Not sure? Well, then it could be you…. Sweating yet? Even if it isn’t you, whatever your role, you have a part to play in keeping your business safe.