GreenPages Blog

As an IT professional, you need to stay current on all things tech; with articles from industry experts and GreenPages' staff, you get the info you need to help your organization compete and succeed!

Managing Resources in the Cloud: How to Control Shadow IT & Enable Business Agility

Read More
All Posts

Managing Resources in the Cloud: How to Control Shadow IT & Enable Business Agility

In this video, GreenPages CTO Chris Ward discusses the importance of gaining visibility into Shadow IT and how IT Departments need to offer the same agility to its users that public cloud offerings like Amazon can provide.

[youtube]http://www.youtube.com/watch?v=AELrS51sYFY[/youtube]

If you would like to hear more from Chris, download his on-demand webinar, "What’s Missing in Today’s Hybrid Cloud Management – Leveraging Cloud Brokerage"

You can also download this ebook to learn more about the evolution of the corporate IT department & changes you need to make to avoid being left behind.

Comments

Related Posts

Tech News Recap for the Week of 03/01/21

If you had a busy week and need to catch up, here’s our recap of tech stories you may have missed the week of 03/01/21!

Microsoft Exchange Zero-Day Vulnerabilities Being Actively Exploited in The Wild

By Randy Becker, CISO & VP, Network and Security Consulting It isn’t common for Microsoft to release a security update for an 11-year-old server application. So, when they do, people take notice. Especially when tied to Email. Microsoft has just released out-of-band security updates for a zero-day exploit that is actively being exploited in the wild. Of significant importance is that this is for all supported Microsoft Exchange versions plus Exchange 2010.

Zero Trust Does Not Mean Zero Access

By Randy Becker, CISO & VP, Network and Security Consulting Zero Trust is not new, but it has recently started to show up a lot in security circles. A quick search shows that there are a lot of organizations with thoughts on this topic. Given the infamous SolarWinds breach, we are starting to hear more about “Zero Trust,” “Defense in Depth,” and my personal favorite “Assume the Breach.” Last Friday CISA quietly posted the following important guidance on Zero Trust: NSA Releases Guidance on Zero Trust Security Model. This should be on the short list of reading for everyone.