My CompTIA Cloud+ Favorites: 3 Topics to Watch
Association of Information Technology Professional
JULY 23, 2021
Intro to a series covering my three favorite CompTIA Cloud+ topics: Managing compute resources, migrations and cloud security layers.
Association of Information Technology Professional
JULY 23, 2021
Intro to a series covering my three favorite CompTIA Cloud+ topics: Managing compute resources, migrations and cloud security layers.
Forrester IT
FEBRUARY 8, 2021
This January, I joined Forrester as an analyst on the Security and Risk team. I’ll be covering topics like Network Analysis & Visibility (NAV), Zero Trust Architecture, and the Zero Trust eXtended (ZTX) ecosystem. Hello everyone!
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Forrester IT
NOVEMBER 4, 2021
Before I joined Forrester, my colleagues Jeff Pollard and Amy DeMartine initiated our product security research, leading to our first report on the topic, Secure What You Sell: CISOs Must Tackle Product Security To Protect Customers.
Tech Republic Cloud
FEBRUARY 25, 2024
The purpose of this Cloud Security Policy, written by Ray Fernandez for TechRepublic Premium, is to provide guidelines for secure and effective cloud computing operations that ensure the integrity and privacy of company-owned digital resources.
Advertisement
The topics covered include: Using Cassandra as if it were a Relational Database. Overlooking Security Considerations. However, many developers and administrators who are new to this NoSQL database often encounter several challenges that can impact its performance. Managing Delete Heavy Workloads. Running Unoptimized Queries.
Tech Republic Cloud
FEBRUARY 25, 2024
The purpose of this Cloud Security Policy, written by Ray Fernandez for TechRepublic Premium, is to provide guidelines for secure and effective cloud computing operations that ensure the integrity and privacy of company-owned digital resources.
GeekWire
APRIL 25, 2024
(GeekWire File Photo / Todd Bishop) Satya Nadella has made a habit on Microsoft’s earnings calls of touting the revenue growth in the company’s security technology business. It was a brief diversion from the bigger topic of the day. The company has been here before, more than two decades ago.
Advertisement
Understanding your data security needs is tough enough, but what can be even more difficult is choosing the right software to fit your company. The following checklist is built to help you evaluate the scope of services offered by various encryption solutions on the market and covers questions on the following topics: Encryption.
Let's personalize your content