This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Remote work (think video conferencing and cloudmigrations) has only exacerbated the number of systems employees frequent. •Reduce unnecessary applications and systems. Using 10 or more business applications weekly is the norm for approximately a quarter of survey respondents.
Sometimes great old blog posts are hard to find (especially on Medium …), so I decided to do a periodic list blog with my favorite posts of the past quarter or so. It covers both Anton on Security and my posts from Google Cloudblog [and now our CloudSecurity Podcast too!]. Here is my second.
The threat landscape is constantly evolving, ransomware is more persistent than ever before, and HEAT attacks have rendered traditional security solutions ineffective.”. For more information on HEAT, please visit our blog, “ Too Hot to Handle.”. About Menlo Security. Menlo Security is headquartered in Mountain View, California.
The fact is that nobody likes to talk about architecture when shopping for the latest and greatest cyber security technology, and most organizations have been content to continue fitting new security tools and capabilities into their existing traditional architectures. Build a Cloud-Ready NetworkSecurity Architecture Today.
The whole story from our GCP blog is cross-posted below: Security continues to be top of mind for large enterprises as well as smaller organizations and businesses. Furthermore, cloudsecurity continues to puzzle many security leaders and technologists. See you at CloudSecurity Podcast by Google.
So, we ( Tim and Anton , the crew behind the podcast ) wanted to post another reflections blog based on our CloudSecurity Podcast by Google being almost 3 (we will be 3 years old on Feb 11, 2024, to be precise), kind of similar to this one. and some classics like cloudmigrationsecurity woes. More video!
The whole story from our GCP blog is cross-posted below: Security continues to be top of mind for large enterprises as well as smaller organizations and businesses. Furthermore, cloudsecurity continues to puzzle many security leaders and technologists. Modern Security Operations Centers (SOC). Learn more.
So, we ( Tim and Anton , the crew behind the podcast ) wanted to post another reflections blog based on our CloudSecurity Podcast by Google being almost 3 (we will be 3 years old on Feb 11, 2024, to be precise), kind of similar to this one. and some classics like cloudmigrationsecurity woes. More video!
We organize all of the trending information in your field so you don't have to. Join 28,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content