Operations | Monitoring | ITSM | DevOps | Cloud

June 2023

Top 5 cloud security risks

Cloud security is a constant concern and tends to revolve around common themes - how do you give intended users access to the data and systems their clearance allows, while maintaining a good user experience; and how do you keep unintended users or malicious bots out? In the entanglement of systems, services, and applications that make up a modern IT infrastructure, this is a lot harder to balance in practice than it is on paper.

Understanding the network edge and edge networking

Generally speaking, a network ‘edge’ is the boundary between two separate networks - where one network ends and another begins. Edges are important, primarily from a security standpoint as they define the jurisdictions owned by different parties, and ‘the edge’ has become a more popular topic of conversation recently through trends which see network resources moved from centralised locations to network edges to make them closer to the end user.