Brian Thomas is the head of content marketing at Uptycs, and has 15 years of experience as an advertising creative, copywriter, and more recently as a content marketing leader specializing in tech and security. Prior to Uptycs, Brian led content marketing operations for Lenovo's software division and headed up content marketing at BitSight.
We’ve posted quite a bit about how more companies are shifting their workloads to the cloud. But a key question is how do you secure those workloads in the cloud? With some many different permutations of cloud workloads, from virtual machines, to endpoints, to containers, getting started with how to secure it all can seem a little overwhelming? So what are some cloud workload security best practices?
It’s no longer an on-prem world. For years we’ve all heard about the disappearing security perimeter, the shift to SaaS, cloud-based workloads and new concepts like containers and Kubernetes. For years tech marketing and airport billboards have promised that the cloud can help your organization scale, become more competitive and transform your business. Which it can, but for many organizations, particularly those in highly regulated industries, the question remains:
“Digital transformation” has been one of the biggest buzzwords of the last decade-- and has come to mean many things to many people. But the biggest manifestation that most workers have come to encounter has been the shift to the cloud. As more organizations move away from purchasing costly on-site servers and locally installed software, a new breed of IT infrastructure has sprung up termed ‘cloud native.’
Securing your data and devops environments has never been harder. As digital transformation accelerates and more of the business moves to the cloud, the job of cybersecurity teams has never been more difficult. With cloud deployments scattered across multicloud and hybrid environments, and touching nearly every facet of the business, it’s both harder and more important than ever to ensure that you have full visibility into all of your cloud controls.
In the last 10 years podcasts have gone from an obscure internet oddity (originally using the RSS format to spread audio information) to creating a new golden age of radio. From true crime to horror fiction to covering any professional topic imaginable, there’s a podcast out there for everyone.
And that includes cybersecurity pro’s. No matter what aspect of security you’re involved with or interested in, there’s a podcast that can help you learn more, grow your skills, give you a new perspective, or make you laugh.
Movies are a powerful part of our modern culture and influence us in ways we seldom think about—from the clothes we wear to the music we listen to...even our career choices and how we think about them. Over the years technology has played an ever bigger role in our lives, and that’s been reflected in films of the past 40 years. But as technology has become a thematic element, exploiting it and securing it has also emerged as a major part of film, and that’s had a profound influence over the years on both the technology and cybersecurity industries, both as a source of inspiration...or as just something to laugh about or have fun with.