dcsimg

Browser sync—what are the risks of turning it on?

Modern browsers include synchronization features (like Google Chrome’s Sync) so that all your browsers, on all your devices, share the same tabs, passwords, plugins, and other features. While this is certainly convenient, particularly when you’re migrating to a new device, synchronizing browsers also comes with some risks. What is browser sync? Browser syncing was introduced in … [Read more...]

RegTech explained: a crucial toolset for the financial industry

Every organization in the financial industry needs to meet certain regulatory obligations, even if it’s just filing a tax return or submitting an annual report. In certain industries, such as financial services, they’ve added their own additional sets of rules that must be adhered to. For example, organizations who take and process credit card payments have an obligation to meet the Payment … [Read more...]

Lock and Code S1Ep12: Pinpointing identity and access management’s future with Chuck Brooks

This week on Lock and Code, we discuss the top security headlines generated right here on Labs and around the Internet. In addition, we talk to Chuck Brooks, cybersecurity evangelist and adjunct professor for Georgetown University’s Applied Intelligence Program and graduate Cybersecurity Programs, about identity and access management technology. This set of technologies and policies … [Read more...]

Cloud workload security: Should you worry about it?

Due to the increasing use of the cloud, organizations find themselves dealing with hybrid environments and nebulous workloads to secure. Containerization and cloud-stored data have provided the industry with a new challenge. And while you can try to make the provider of cloud data storage responsible for the security of the data, you will have a hard time trying to convince the provider that they … [Read more...]

How to Use Azure Spot to Reduce Azure Virtualization Costs

This article explains how Azure Spot can provide a scalable virtualization management solution saving you from using unnecessary VMs. Read the post here: How to Use Azure Spot to Reduce Azure Virtualization Costs … [Read more...]

Why You Should Use OneDrive for Business

This article looks at what Microsoft OneDrive for Business is, and how to govern the features that make up this excellent cloud storage solution. Read the post here: Why You Should Use OneDrive for Business … [Read more...]

The Real Cost of Microsoft 365 Revealed

In this article, we break down the complete pricing of Microsoft 365, and how you can help your business maximize your investment in M365 services Read the post here: The Real Cost of Microsoft 365 Revealed … [Read more...]

How to Enable Advanced Threat Protection in Microsoft 365

Advanced Threat Protection uses machine learning to protect Microsoft 365 apps in real-time. Here's what you need to know to get it running effectively Read the post here: How to Enable Advanced Threat Protection in Microsoft 365 … [Read more...]

Explained: cloud-delivered security

As a counterpart to security for your assets in the cloud, you may also run into solutions that offer security from the cloud. These solutions are generally referred to as cloud-delivered security. Cloud-delivered security is sometimes called security-as-a-service which we will avoid here as it might be confused with the more generally used term Software-as-a-Service (SaaS). Types of … [Read more...]

Cloud data protection: how to secure what you store in the cloud

The cloud has become the standard for data storage. Just a few years ago, individuals and businesses pondered whether or not they should move to the cloud. This is now a question of the past. Today, the question isn’t whether to adopt cloud storage but rather how. Despite its rapid pace of adoption, there are some lingering concerns around cloud storage. Perhaps the most persistent issue … [Read more...]