Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

JumpCloud and Google: Even Better Together

It’s been just over a year since JumpCloud and Google announced a strategic partnership to seamlessly manage your Google Workspace identities, the access they need, from any device leveraging one platform. You may be wondering what’s new, how it’s going for our customers and partners, and what benefits they’re getting from the joint solution? This article provides a condensed set of resources that make it simpler to get started with a demo or simulations.

How Are SMEs Approaching AI?

Have you heard about AI yet? Just kidding. We know you have. Recently, AI’s popularity has skyrocketed among businesses and consumers alike. This surge was driven by a combination of technological advancements (e.g., machine learning, natural language processing, and data analytics) with an increase in tool accessibility and user-friendliness.

Cloud Sprawl: How to Tidy It Up

Cloud computing offers indisputable benefits, but with the caveat that it can quickly become a disorganized jumble unless adequately managed. It’s common for the average organization to use dozens of cloud instances, solutions, and resources scattered across multiple platforms. Such off-premises services quickly accumulate to accommodate the company’s ever-growing needs. This uncurbed growth, known as cloud sprawl, creates significant economic and security challenges.

Fast and Secure Hosting Solutions for Your Digital Needs

When it comes to a website's performance, security, reliability, and total maintenance costs, everyone needs good web hosting. However, choosing the best web host can be quite challenging, because there are so many possibilities and you may not be aware which one is the best. Luckily, this article will help you choose the best web host by explaining the various options, their benefits and drawbacks, and how to begin.

Why Embrace a Cloud Operating Model?

Taking on the concept of a cloud operating model is not just for people who want to be fashionable; it's a clever tactic that any business can use if they desire efficient scaling and better service delivery. This method uses the benefits of cloud computing to make operations simpler, more flexible and less costly.

What is Azure Identity Protection and 7 Steps to a Seamless Setup

Protecting credentials has become increasingly critical in recent years, with everyday employees using more passwords, devices, and systems than ever before. Remote work has significantly increased the risk of identity attacks. 55% of remote workers say they receive more phishing emails than they used to while working in the office and attempted password attacks are up tenfold. In 2023, Microsoft detected 156,000 business email compromise (BEC) attacks every day over twelve months.

Teamwork for Internet security: Rapid response & compliance

Host João Tomé is joined by two guests. First, we have Ranee Bray, Chief of Staff of our Security Team, discussing how we managed programmatically what we called Code Red — several teams were put together to focus in 30 days on strengthening, validating, and remediating a security incident. Credential management, software hardening, vulnerability management, additional alerting, and other areas were also a part of the “Code Red” effort.

Teaser. Half a Century of Connectivity: Celebrating 50 Years of TCP

In May 1974, 50 years ago, Vint Cerf and Bob Kahn made history with their paper on TCP (Transmission Control Protocol) published by @IEEEorg. Here is a teaser of a longer video (and "This Week in Net" episode) coming soon from our protocol experts, Mark Nottingham (Australia), and Lucas Pardue (UK).

Comparing OPA/Rego to AWS Cedar and Google Zanzibar

Rego, the policy language of the Open Policy Agent (OPA), is known for its flexibility and power in policy enforcement across various systems. Its declarative syntax and data-centric approach make it versatile for application authorization, infrastructure as code (IaC) authorization, and network policies. To fully appreciate OPA/Rego’s capabilities, it’s helpful to compare it with other policy languages and frameworks like AWS’s Cedar and Google’s Zanzibar.