January 2014 Posts

Cloud Security: Who is Behind the Curtain?

Imagine a sinister-looking man. Sporting an ominous Hawaiian shirt, he lurks through the halls of your organization seeking a way to pilfer through your precious data and extract what he needs to sell for profit. He auspiciously finds one of your workstations, boots it up, and logs in to the network using a sticky note... Read More