Cloud Security

Cloud Security

linux system management

What is Linux® System Management?

What is Linux® system management? Well, other than a common challenge in the modern office, Linux system management refers to the ability to manage Linux-based systems such as desktops, laptops, and servers ...

Understanding the Primary Threats and Security Concerns to Container Environments

Regular readers of The State of Security should now have a general understanding of why organizations need security for their containers. But they still might be a bit fuzzy on the specifics ...
what is the radius protocol

What is the RADIUS Protocol?

What is the RADIUS protocol? RADIUS is a network protocol that is used to authenticate and authorize user access to a remote network. The term, RADIUS, is an acronym that stands for ...
linux management from the cloud

Linux Management from the Cloud

Modern IT organizations have their hands full. With mixed platforms, on-prem and cloud-based applications, an array of file storage systems, networks that can span multiple locations, and more, modern IT environments have ...
Identity Management Competition

Identity Management Competition

Identity management is becoming one of the hottest markets in the IT space, which is interesting because the identity and access management (IAM) category has historically been controlled by one major player ...
Kid monitoring app TeenSafe exposes user data

Kid monitoring app TeenSafe exposes user data

Phone application TeenSafe allegedly leaked thousands of passwords that were kept on a vulnerable Amazon server, found Robert Wiggins, a security researcher based in the UK. The application was created for parents ...

Loopholes in Cloud Security Exposed Online 50% of Corporate Databases

Cloud security has grown into a major issue for enterprises, as only one company in six encrypts all data, according to a Bitdefender survey. While 85% of CISOs fear security flaws in ...
what's better than OneLogin

What’s better than OneLogin™?

OneLogin™ has historically been a popular web application single sign-on (SSO) solution. Recently, they added some support for on-prem applications as well. This new approach to application access is what vendors and ...
Active Directory vs. Okta

Active Directory vs. Okta

Between the proliferation of Mac and Linux systems and the move to cloud-based resources, the IT landscape has witnessed a tremendous amount of change over the last two decades. With changes like ...
Loading...