Article December 12, 2016 Cloud sandboxes will become a must-have for DevOps toolkit As more companies attempt to adopt DevOps for software development activities, the gaps in DevOps… Di Freeze, Editor Love0
Article November 21, 2016 Cloud sandboxes – stepping stones to hybrid clouds Here’s how enterprises can benefit from leveraging cloud sandboxes for migrating to hybrid clouds, private… Di Freeze, Editor Love0
Article October 31, 2016 The wrath of DDoS Why has there been a staggering rise in Distributed Denial of Service (DDoS) attacks? Why… Di Freeze, Editor Love0
Article October 24, 2016 How to design application architecture for the cloud How can you design an application architecture for the cloud that is flexible and scalable?… Di Freeze, Editor Love0
Article March 28, 2016 Why and How Remote Network Access Needs to Change Can traditional approaches to providing remote access match the current landscape of today’s workforce model?… Di Freeze, Editor Love0
Article August 25, 2015 Slamming the Door on Security Breaches In today’s cloud-based, sharing economy, how can organizations provide secure access to corporate applications and… Di Freeze, Editor Love0
Article August 11, 2015 Best Practices for VoIP Security Corporate VoIP systems are gaining ground, but with increased adoption come increased attacks and more… Di Freeze, Editor Love0
Article August 3, 2015 Elevator Pitch on Mobile Security for VCs and Angels Are you a VC or angel thinking about where to invest your money? Here is… Di Freeze, Editor Love0
Article July 20, 2015 Web SSO versus Enterprise SSO How can your organization simplify user access and increase security while allowing users to log… Di Freeze, Editor Love0
Article January 12, 2015 How Can Enterprise IT Increase Mobile Access and Security in the BYOD Era Enterprise IT needs to establish a new symbiotic relationship that will both increase access and… Di Freeze, Editor Love0