Microsoft exec reveals “routine” secrecy orders from government investigators

Microsoft exec Tom Burt revealed Wednesday that Federal law enforcement agencies send “routine” secret orders for customer information.

Read more

Cloud vs on premises: 3 reasons the Cloud is winning

Many US organizations are migrating from in-house, on-premises solutions to the Cloud. We look at what’s driving the Cloud’s ascendency.

Read more

OVH cloud datacenter destroyed by fire

The third largest hosting provider in the world has seen its site in Strasbourg destroyed by a fire. What does it mean for you?

Read more

Browser sync—what are the risks of turning it on?

Browser synchronization is a handy feature but it comes with a few risks. Here’s what you should be asking yourself before you switch it on.

Read more

RegTech explained: a crucial toolset for the financial industry

The financial industry has come to rely on RegTech. It helps financials comply with regulations and tightens up data safety and security. But what is it exactly?

Read more

Lock and Code S1Ep12: Pinpointing identity and access management’s future with Chuck Brooks

This week on Lock and Code, we talk to Chuck Brooks, adjunct professor for Georgetown University’s Applied Intelligence Program , about identity and access management technology.

Read more

Cloud workload security: Should you worry about it?

While the cloud workload is growing at a rapid pace, isn’t it time to start worrying about securing it?

Read more

Explained: cloud-delivered security

What is cloud delivered security aka security as a service? Is it something that can benefit your organization? There’s a good chance that it might.

Read more

Cloud data protection: how to secure what you store in the cloud

With robust security measures and a healthy dose of general internet safety guidelines, cloud storage can be as secure as any other option on the market.

Read more

Explained: the strengths and weaknesses of the Zero Trust model

Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.

Read more

Select your language