😉

A Closer Look at AWS re:Invent 2023’s Standout Security Features

Attending AWS re:Invent in Las Vegas has become an annual pilgrimage for cloud aficionados like myself. Each year, a throng of 50,000 enthusiasts converges to discover the latest features, snag complimentary socks ...
😉

A Closer Look at AWS re:Invent 2023’s Standout Security Features

Attending AWS re:Invent in Las Vegas has become an annual pilgrimage for cloud aficionados like myself. Each year, a throng of 50,000 enthusiasts converges to discover the latest features, snag complimentary socks ...

Cloud Chronicles: Unlocking the Secrets of Solvo

Unlocking the Potential:   ​​For organizations leveraging cloud services to facilitate business growth, it is vital to have a comprehensive and up-to-date understanding of identities and access privileges. In a dynamic cloud ...

Unlocking the Power of Cloud Computing: How Solvo Transforms Business Operations

As the boundaries of technology continue to be pushed, businesses are constantly seeking innovative solutions to streamline their operations, enhance productivity, and drive growth. Cloud computing has emerged as a game-changer, revolutionizing ...
Data Deletion: A cloud vulnerability

7 Cloud Vulnerabilities Endangering Your Data!

Over the last few years, cloud computing has been growing at a rapid rate. It has completely revolutionized the business world, enabling organizations to keep up with today’s increasingly digitized landscape.  According ...

Vulnerability Finding Using Machine Learning

Microsoft is training a machine-learning system to find software bugs: At Microsoft, 47,000 developers generate nearly 30 thousand bugs a month. These items get stored across over 100 AzureDevOps and GitHub repositories ...

Security in 2020: Revisited

Ten years ago, I wrote an essay: "Security in 2020." Well, it's finally 2020. I think I did pretty well. Here's what I said back then: There's really no such thing as ...

Russian Censorship of Telegram

Internet censors have a new strategy in their bid to block applications and websites: pressuring the large cloud providers that host them. These providers have concerns that are much broader than the ...

Apple to Store Encryption Keys in China

Apple is bowing to pressure from the Chinese government and storing encryption keys in China. While I would prefer it if it would take a stand against China, I really can't blame ...

Interesting Example of Cloud Computing Risks

| | cloudcomputing
One of the aspects of the move to cloud computing I find most interesting is the new and emergent risks that come with the move of services from a traditional networked IT ...

Secure Guardrails