RegTech explained: a crucial toolset for the financial industry
The financial industry has come to rely on RegTech. It helps financials comply with regulations and tightens up data safety and security. But what is it exactly?
Lock and Code S1Ep12: Pinpointing identity and access management’s future with Chuck Brooks
This week on Lock and Code, we talk to Chuck Brooks, adjunct professor for Georgetown University’s Applied Intelligence Program , about identity and access management technology.
Cloud workload security: Should you worry about it?
While the cloud workload is growing at a rapid pace, isn’t it time to start worrying about securing it?
Explained: cloud-delivered security
What is cloud delivered security aka security as a service? Is it something that can benefit your organization? There’s a good chance that it might.
Cloud data protection: how to secure what you store in the cloud
With robust security measures and a healthy dose of general internet safety guidelines, cloud storage can be as secure as any other option on the market.
Explained: the strengths and weaknesses of the Zero Trust model
Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.
Explained: edge computing
What is edge computing? And how will this fledgling technology change the way we create, consume, share, and store data? We tackle the technical considerations and security implications for delivering data to the edge.
Explained: What is containerization?
Containerization is gaining traction as a method to improve consistency, portability, and scalability without the investments required for virtualization. But is it secure?
Can we trust our online project management tools?
Online project management tools can be not only useful, but a lifeline for developers and PMs who juggle multiple tasks with competing deadlines. How can we use them in a secure way?
Explained: the cloud
The cloud. What is it? What are the pros and cons, and how can we make it as safe as possible? This post covers the basics.