Lock and Code S1Ep12: Pinpointing identity and access management’s future with Chuck Brooks

This week on Lock and Code, we talk to Chuck Brooks, adjunct professor for Georgetown University’s Applied Intelligence Program , about identity and access management technology.

Read more

Cloud workload security: Should you worry about it?

While the cloud workload is growing at a rapid pace, isn’t it time to start worrying about securing it?

Read more

Explained: cloud-delivered security

What is cloud delivered security aka security as a service? Is it something that can benefit your organization? There’s a good chance that it might.

Read more

Cloud data protection: how to secure what you store in the cloud

With robust security measures and a healthy dose of general internet safety guidelines, cloud storage can be as secure as any other option on the market.

Read more

Explained: the strengths and weaknesses of the Zero Trust model

Zero Trust is an information security framework that insists its users “never trust, always verify.” Is this the best security model for organizations today? We examine its strengths and weaknesses.

Read more

Explained: edge computing

What is edge computing? And how will this fledgling technology change the way we create, consume, share, and store data? We tackle the technical considerations and security implications for delivering data to the edge.

Read more

Explained: What is containerization?

Containerization is gaining traction as a method to improve consistency, portability, and scalability without the investments required for virtualization. But is it secure?

Read more

Can we trust our online project management tools?

Online project management tools can be not only useful, but a lifeline for developers and PMs who juggle multiple tasks with competing deadlines. How can we use them in a secure way?

Read more

Explained: the cloud

The cloud. What is it? What are the pros and cons, and how can we make it as safe as possible? This post covers the basics.

Read more

Insider threats in your work inbox

A new phishing campaign that targets businesses goes beyond business email compromise or CEO fraud.

Read more

Select your language