Top

This article asks you to reset your thinking about your perimeter, the firewalls you built and the border between inside/outside: they no longer exist. Modern access patterns blur the lines between inside vs. outside and you need to manage your risk differently than building a wall and controlling what’s passing that wall....

Welcome to “cloudelicious“, a new blog about enterprise cloud technologies, trends, and thoughts on the various cloud computing concepts and the different strategies. Our goal is to help our readers to embrace and leverage the multiple flavors of the cloud....