Category: Security

Cloud Design Goals
Surviving Ransomware attacks

Understanding infrastructure ransomware Ransomware is a type of malware that targets anything it can get into — including backups — to steal or lock up as much data as quickly as possible. Data theft is

Read More >>
Dev, Test, Optimisation
Cloud Vulnerability and Security Scanning

Cloud Vulnerability Scanning can be defined as a process of identifying security risks in Cloud-based applications and infrastructure. Cloud Vulnerability Scanning is usually performed by specialized security tools that are designed to automatically identify common

Read More >>
Risks
Zero Trust in, and with, the Cloud

Zero trust initially focused on segmenting and securing the network across location and hosting models. Today, however, to be successful, zero trust must also integrate with end-user and cloud brokering systems. How zero trust helps

Read More >>
Microservices
Service Mesh – Benefits and Challenges

Microservices and distributed applications require instantaneous network communications and complex orchestrations to ensure high performance and fast scalability. The levels of intricacy require full management automation, since the complexity surpasses the abilities of IT administrators

Read More >>
Security
Java and Security: Fear Not.

    According to a recent report by WhiteSource there is a “substantial rise in the number of known open source security vulnerabilities across all languages over the past two years.” Though the overall number of

Read More >>
Security
Privileged Access Management or PAM

Privileged Access Management or PAM PAM and security in general are concerned with 2 basic concepts: 1 ) Protecting my systems and data from external attack and; 2 ) Protecting my systems and data from

Read More >>