Skip to main content

Expert Insights

blog

Security


Securing and Governing the Power Platform

The Power Platform is compelling with its low-code/no-code capabiltiies, but how do you secure and govern it across your enterprise? Making decisions on structure and governance will set your employees up for success. 

Stephanie Siewert by Stephanie Siewert

COVID Survival Kit: Remote Workforce Security

I recorded a webinar with Alan Mitchell, CISO of Brunswick Corporation. We talked about their security response to COVID and how modern technologies have positively impacted their environment.

Nathan Lasnoski by Nathan Lasnoski

COVID Survival Kit: Remote Workforce Productivity

I recorded an interview on COVID response with Brandon Lemery from Rockwell Automation on Remote Workforfce Productivity. Brandon did an excellent job sharing how Rockwell has leveraged modern technologies and shifted their culture around the remote workforce ecosystem.

Nathan Lasnoski by Nathan Lasnoski

10 Security Changes Every CIO Should Implement

Every quarter we receive a call from a company that has been taken advantage of by a serious security event, typically ransomware or phishing, but also sometimes events more complicated. In many cases enterprise organizations have 95% of their datacenter and end user computing environments compromised. Not surprisingly, in examining these events I’ve consistently noticed […]

Nathan Lasnoski by Nathan Lasnoski

What is a Bastion Host?

Security is one of the many cornerstones of IT and a focus of what we do at Concurrency. When building in Azure, it is important to be able to connect to your resources securely. Bastion hosts are the common way to provide administrative access to private areas of your cloud network.

Paul Harris by Paul Harris

Top 10 Ways to Secure your Azure Environment – Part 1 of 2

Recently I finished off a 10-part series on the top mistakes to avoid when getting started in Azure. I’d like to complement that content with a follow-up pair of posts focused specifically on security. My objective here is to provide a quick-reference checklist you can use to maximize security benefits from the beginning.

Nathan Lasnoski by Nathan Lasnoski

ServiceNow Security – Social Engineering

Protecting your business practice, assets, and proprietary information will always be a never-ending battle. For every security patch that is released, there are operators reverse engineering different aspects of every platform looking for exploits.

Scott Poling by Scott Poling