4 posts

3 steps toward improving container security

Focus on how you build access rules and permissions. Understand the level of granularity needed right from day one to build this. Harden the container host with policies to prevent resource abuse.…


How to avoid data breaches in the cloud

Draft a good data loss prevention (DLP) policy. Build a solution against breaches as well as unauthorized extraction & deletion. Implement encryption in transit as well as at rest: TLS/SSL connections are a must, as are IPsec VPN tunnels.…


How to combat cloud software security threats

Deploy strong identity management and access management systems. Understand how security works with third-party apps & integrations in detail.…


7 non-negotiable security practices for any cloud product

- Track access and usage across cloud providers - Manage access to sensitive data - Automate your user provisioning & de-provisioning…