Skip to main content

Blog

07.Sep.2017
SecludIT, now part of Outpost24
Many companies are wondering about the Google Cloud Platform security. We are here trying to answer your questions about it.
24.Aug.2017
SecludIT, now part of Outpost24
Learn more about our Top 10 Microsoft Azure security best practices to continuously secure your cloud environment from cyber-attacks.
16.Jun.2017
SecludIT, now part of Outpost24
Build and improve your DevOps Cycle with an innovative cloud security solution: Elastic Workload Protector. Detect all your cloud vulnerability with our all-in-one solution
08.Jun.2017
SecludIT, now part of Outpost24
Find how AWS partner security solution - Amazon Inspector - works with Elastic Workload Protector to improve your cloud security
23.May.2017
SecludIT, now part of Outpost24
How to address Docker Vulnerabilities, Failures and Issues with your DevOps team? Improve your Docker security with a vulnerability tool.
09.Mar.2017
SecludIT, now part of Outpost24
Enterprises are migrating to IaaS due to flexibility and speed. However, IaaS brings new security challenges
16.Feb.2017
SecludIT, now part of Outpost24
DevSecOps give the better answer to improve Cloud security and containers security. Companies need fully automated solution for their IaaS environment
05.Jan.2017
SecludIT, now part of Outpost24
Common beliefs that IaaS providers are responsible for the security of customer workloads, are wrong. The shared responsibility model for Infrastructure as a Service (IaaS) means that enterprises have to adapt traditional security to secure cloud based workloads. A cloud workload is a discrete capability or amount of work you’d like to run on a Cloud instance. It can be a web server, a container or an hadoop node for example.
17.Nov.2016
Rafael Alfaro
A web application including authentication usually allows the user access to various types of information. By the same token, several web applications provide advanced features that are assigned through different access levels.
04.Oct.2016
SecludIT, now part of Outpost24
Companies are switching from reactive to proactive security. The first step in being proactive is to identify risks with KPI and KRI audits.

Looking for anything in particular?

Type your search word here