 Features |
|
Knock, knock...
With testing and monitoring in place, building security around privileged credentials in the cloud is significantly important |  |
Monitoring in the shadows
Complete network visibility is a critical asset for dealing with Shadow IT, says Martin Hodgson at Paessler |
 |
The Virtual Contact Centre
Call centres are often viewed as cost centres within organisations. Now, companies are seeking various ways to restructure them, such as through introducing new technologies, outsourcing call centres entirely, or offshoring them |
|
Review |
|
Altaro Office 365 Backup
Altaro offers everything a business needs to secure its Microsoft Office 365 organisations and can be swiftly deployed in the cloud without disrupting normal operations.
|
 |
News |
|
Watch and learn
Securing the cloud based on continuous testing and real-time monitoring is an essential cloud security strategy
|
 |
A routing prefix
Andrei Robachevsky at the Internet Society talks us through the Mutually Agreed Norms for Routing Security (MANRS)
|
 |
The security co-op
As long as cybersecurity is the responsibility of a single department it will remain compromised. Mark Rodbert at idax explains how IAM can change this
|
 |
|
|
|
Comment
Welcome to the January 2020 Newsletter.
We’re beginning the new year with a bang here at Network Computing with the news that nominations are now open for the 2020 Network Computing Awards. You have until 24 January to nominate your finalists based on the products, companies, services and suppliers that have most impressed you in the past twelve months. We’ve introduced a number of new categories this year to reflect trends and changes in the industry, so visit the awards website for more information and to make your nominations
Elsewhere this month we’re taking a closer look at the cloud. First, Nick Bowman at CyberArk explains how unsecured credentials pose a significant threat to cloud computing, especially when it comes to those with privileged access. Then Kevin J. Smith at Ivanti examines how effectively curtail the high cost of cloud sprawl, stating that “Cloud instances should be treated as strategic assets and rigorously recorded in an inventory, which must be constantly updated with the relevant attributes.”
We also have Aleksander Gorkowienko at Spirent SecurityLabs making the case for continuous testing and real-time monitoring of cloud environments as the most effective method of keeping them secure. As Aleksander explains, “Securing such a dynamic, diffuse, and fast-evolving architecture is a challenging task. It requires continuous, comprehensive testing of the platform, based on real-time threat intelligence.” Read his article featured here for more.
Follow us :
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
|
|