There are two types of applications: those that have moved to the cloud and those that have yet to move to the cloud. Bold claim? We don’t think so. In this article, we will look at how to protect your cloud-based information, some of the approaches available for doing so, and three scenarios demonstrating the securing of sensitive data stored in the cloud.
Read MoreUnconventionally, Pyramid reserves a seat at the executive table for a Chief Solutions Architect. Why? What are the benefits to having this presence at the…
Read MoreWritten by Mike Shields Lightweight containers are low-overhead, isolated mechanisms for running applications – sort of a lighter alternative to a virtual machine. They are…
Read More