Top

Data breaches remain a top concern for many customers and it still can be very hard to convince some security officers to move data to the cloud. Most of the customers want to limit access to their cloud resources to their networks only. This article describes how to achieve this goal....

This article is a real-life example of a dated application that must be touched so it can continue to run – and why lift & shift sometimes not works. Especially when it’s a internet-facing application and you’re still dealing with credentials yourselves. We share learnings we’ve had with our app, that can easily be transported...

This article asks you to reset your thinking about your perimeter, the firewalls you built and the border between inside/outside: they no longer exist. Modern access patterns blur the lines between inside vs. outside and you need to manage your risk differently than building a wall and controlling what’s passing that wall....