We're ready to help

Our cloud experts can answer your questions and provide a free assessment.

a meeting
Amazon S3 Data Loss

INSIGHTS : 15 Nov, 2018

Amazon S3 Data Leaks: 6 Steps to Ensure Your Data is Protected

Every year, millions of sensitive records are leaked from Amazon S3. Misconfigured S3 buckets are some of the most common and widely targeted attack vectors;.


INSIGHTS : 26 Jun, 2018

Templates: The Most Powerful (And Underrated) Infrastructure Security Tool

If your team is manually building cloud instances and networks for every application, you’re setting yourself up for a data breach. In a new article.


INSIGHTS : 16 May, 2018

Cloud-based machine learning offers new approach to security

Adoption of machine learning among healthcare companies is on the rise, thanks to new tools from cloud service providers like Amazon Web Services and Azure..


INSIGHTS : 19 May, 2017

WannaCry and Public Cloud

Yesterday, I attended a CISO Executive Summit here in NYC.  The room was packed with 175 CISOs and top-level security leaders from various industries.  There.


INSIGHTS : 5 Jan, 2017

What is Security by Design?

Security is “Job Zero” for every company. If you are putting your customers or users at risk,  you will not be in business for long..


INSIGHTS : 6 Dec, 2016

Continuous Compliance & The Art of AWS Security Automation

Featured in Zero Day Magazine Compliance audits are costly and time-consuming. Your team can spend months preparing for an audit or risk assessment. In the.


INSIGHTS : 25 Oct, 2016

AWS Security Training: Top Videos & Resources

Security in the AWS Cloud requires a new way of looking at traditional tools and practices. Luckily, many free and low-cost resources are available to.


INSIGHTS : 20 Oct, 2016

Advanced Cloud Security: Q&A with a Sr. DevOps Engineer

Enterprise IT has long struggled to develop common standards for the security of cloud deployments. With multiple cloud vendors, fast-moving product teams, and a changing.


INSIGHTS : 20 Apr, 2016

Docker Security: How to Monitor and Patch Containers in the Cloud

Nearly a quarter of enterprises are already using Docker and an additional 35% plan to use it. Even skeptical IT executives are calling it the.


INSIGHTS : 13 Apr, 2016

The Key to Maximizing the Advantages of Cloud Security

by Paul Fletcher, Security Evangelist at Alert Logic Despite the pervasive use of the cloud to handle complex, secure workloads, many organizations question whether the cloud.