Expert Insights

blog

Cyber Security


What is a Bastion Host?

Security is one of the many cornerstones of IT and a focus of what we do at Concurrency. When building in Azure, it is important to be able to connect to your resources securely. Bastion hosts are the common way to provide administrative access to private areas of your cloud network.

Paul Harris by Paul Harris

Top 10 Ways to Secure your Azure Environment – Part 1 of 2

Recently I finished off a 10-part series on the top mistakes to avoid when getting started in Azure. I’d like to complement that content with a follow-up pair of posts focused specifically on security. My objective here is to provide a quick-reference checklist you can use to maximize security benefits from the beginning.

Nathan Lasnoski by Nathan Lasnoski

ServiceNow Security – Social Engineering

Protecting your business practice, assets, and proprietary information will always be a never-ending battle. For every security patch that is released, there are operators reverse engineering different aspects of every platform looking for exploits.

Scott Poling by Scott Poling

Single Sign-On in the Wild

A rash of rogue food orders with the company Deliveroo allowed hungry hackers to go on a booze and food binge in 2016—they logged in to customers’ accounts, changed delivery addresses, and ordered whatever they pleased.

Karsten Huttelmaier by Karsten Huttelmaier

Leveraging Facial Recognition in your systems

Security is an important aspect of our lives and we use various means of security every day. In order for us to secure items in our lives, we have to have a trust factor. This applies to our bank accounts, our passwords, and even vehicles that we utilize every day. Sometimes, security can be complex -- in the case of bank account being accessed over the internet, or a rolling security codes in your car's remote start module, or RFID and barcodes in your driver license or passport.
 

Lwin Maung by Lwin Maung