What does GDPR mean for your Cloud Application?

Печать

GDPR came into effect on May 25th. What first seemed like something that could be swept under the rug is quickly becoming reality as everyone scrambles to understand the extent of its implications. Even with it already here, less than 10% of businesses say they are GDPR ready. But with fines for non-compliance slated to reach €20m or 4% of total worldwide revenue from last year (whichever turns…

Overcoming Compliance Confusion: Why You Need a SOC 2 Foundation

SOC 2 final

Yes, it’s overwhelming.

There is a rising wave of formal compliance efforts today, driven by customer demands, regulatory requirements, and/or the organizations’ desires to demonstrate its internal security controls and practices to external parties. Recent data protection laws have enshrined the individual’s right to privacy and security of their personal data across the globe. As…

The Value of OpenShift for the Enterprise Software Transformation

worker_guy

Red Hat OpenShift offers a full platform solution based on open source technologies. It provides DevOps teams with integrated environments that oversee key aspects of the software development life cycle. It leverages a Kubernetes platform that manages the building and deployment of Docker containers at scale, and offers rich features of its own. OpenShift can be easily integrated into…

How to Generate and Use Dynamic Secrets for AWS IAM with Vault using Kubernetes & Helm

vault

Your first step to securely store, access, and deploy sensitive application information
In today’s API and Cloud-platform driven world, we operators, developers, and architects are presented with the critical challenge of managing application secrets, encryption, and access to any application and infrastructure in the Cloud. Securing and rotating secrets regularly and properly, both in t…

Security and Resiliency for SaaS Companies

cybersecurity

It’s neither a secret nor a surprise that security is a growing problem for SaaS companies, which cumulatively possess a tremendous amount of data. Having been proclaimed the new oil, the personal information of customers has become an extremely valuable commodity and this grabs the attention of hackers. Every day, new vulnerabilities are uncovered and malicious attacks are launched at a…

Parlons-en Cloud 2014: some topics

prlons

Next week, Stephan Bureau and I will join a few hundred IT professionals from Québec for a day-long conference on cloud computing. We’re tackling three big themes, with panelists from both vendors and end-users, spanning small and large businesses as well as governments.

The three themes are at the forefront of technology policy today:
Transition and migration
Cloud computing is a major…

420 Guy Street
Montreal, QC H3J 1S6
CANADA

56 Temperance St, 7th Floor
Toronto, ON M5H 3V5
CANADA
201 Sommerville Ave.
Sommerville, MA 02143
USA