Cloud Security

Cloud Security

HP Patches High-Risk Vulnerability in Business Printers

HP Patches High-Risk Vulnerability in Business Printers

/
HP released security firmware updates this week for dozens of printers, including enterprise models, to fix a high-risk vulnerability that could allow attackers to compromise the devices. The vulnerability, tracked as CVE-2017-2750, ...
Insider threats within the cloud

Insider threats within the cloud

/
Contrary to common perception, time and time again reports show that the most significant security threats to an organization are the so-called Insider Threats. Research estimates hold these threats... Go on to ...
AWS Server User Management as a Service

AWS Server User Management as a Service

/
Amazon Web Services (AWS) is an Infrastructure-as-a-Service (IaaS) platform that offers a wide range of cloud based IT resources like compute services, applications, data storage, and infrastructure for modern organizations.... The post ...

Apple served with warrant for Texas mass killer’s iCloud data

/
Texas police are looking for any data stored by gunman Devin Patrick Kelley, who was found with an iPhone after he killed himself ...
WPA2 Alternative

WPA2 Alternative

/
With the KRACK WPA2 vulnerability making headlines in October 2017, many IT admins are asking if there is a WPA2 alternative that is safer. The short answer is not really.... The post ...
Capital One Debuts Beta of Critical Stack Container Orchestration Platform

Capital One Debuts Beta of Critical Stack Container Orchestration Platform

/
Critical Stack, a division of Capital One, rolled out a beta program for its containerization management software and at least 41 Fortune 500 enterprises have signed up to take part. An application ...
The Office in a Box: the JumpCloud + Meraki Blueprint for Cloud-Controlled Networking

Active Directory as a Service & RADIUS Authentication

/
As IT organizations continue to look for ways to step up their security efforts, the network is an area of constant scrutiny. Sys admins and IT directors alike recognize that... The post ...

Securing the Entire Container Stack, Lifecycle and Pipeline – Part 1

/
With the rise in popularity of containers, development and DevOps paradigms are experiencing a massive shift while security admins are left struggling to figure out how to secure this new class of ...
Case Study: Ooyala Goes Global

Case Study: Ooyala Goes Global

/
Ooyala is one of the leading providers of various software and services that focus on producing, streaming, and monetizing over-the-top video. They have a large group of remote workers and... The post ...
Managing Systems with JumpCloud | Whiteboard Video

Mac Enterprise Management – Users & Systems

/
Macs have infiltrated the enterprise – a domain that once was in the firm clutches of Microsoft Windows. Over the last several years, Mac enterprise management for both users and... The post ...
Loading...