Product Review: UserLock
UserLock is a product that works alongside Active Directory to protect and enhance access to Windows systems (laptops Desktops and Servers).
UserLock is a product that works alongside Active Directory to protect and enhance access to Windows systems (laptops Desktops and Servers).
Although ransomware has been established for a very long time: recently people have been made more conscious of ransomware and are more knowledgeable of what it is, including its regular occurrences. Albeit not new, the impact of ransomware has likely become more far reaching and more serious with time. Businesses are more reliant on digital data and IT systems and ransomware acts to deny service and compromise these essential systems and data until the ransom is paid.
This article takes a look at the security challenges presented by Microservices.
I’m often asked how one should go about landing a job and potentially a career in cybersecurity. I am optimistic that with my 15 years of experience in this realm, I can offer some direction.
In this article we will outline the three Instance purchase models for Amazon EC2 and determine under which conditions either model may be best utilised for maximum value to be achieved from each purchase option.
There are several features of AWS that are little known or unexplored by the majority of rims using the AWS platform. In this article, as part of an introduction to AWSs platform series, we cover the Security Token Service (STS). We will look at use cases and features of this service and consider the benefits it may offer its users.
In this article we explore what an information security management system (ISMS) is, and how it can be incorporated in AWS so that the risks are addressed.
This article looks at areas you need to consider to secure worloads in AWS.
In part one of the article series we looked at Amazon Web Services share in the AWS Shared Responsibility Model. In this article we will try to better understand the customer responsibilities and consider best practices the customer should consider following to ensure his/her responsibilities are effectively met and security maintained.
In this article series we will consider the AWS Shared Responsibility Model to better understand the customer responsibilities and those of AWS when utilising their services and how the security benchmarks are achievable through a shared responsibility approach.