Tel: 020 8456 3550

Category Archives: Blog

Cloud Security Best Practices – IDAM

Cloud Security Best Practices In our series of cloud security best practices, we will be outlining some basic, actionable steps that organisations should consider when migrating to a new cloud infrastructure or securing their existing estate. This article will consider the role of user security via Identity and Access Management (IDAM). Principle 1: Secure Identity […]

Read More...

Cloud Security Skills for 2017

Cloud Computing Security Concerns With the rise of cloud computing, different concerns about adopting the cloud have arisen over the years. In 2016, the top concerns were pretty similar to previous years, though some have become higher or lower priority as the understanding of cloud computing has changed. Three of the top cloud computing concerns going into […]

Read More...

Who Uses OpenStack? Cloud Adoption Strategies

People often ask me, “Who uses OpenStack?” and “What are they using it for?” Perhaps that’s best answered by OpenStack’s own regular user survey. From there we can find the below chart, showing the breakdown of who uses OpenStack across sectors. Figure 1 Breakdown of users by sector (Source: https://www.openstack.org/assets/survey/April-2016-User-Survey-Report.pdf) The breakdown of who uses OpenStack across sectors […]

Read More...

SCS AWS Consulting Partnership

SCS Confirms AWS Consulting Partnership With this AWS consulting partnership, professional services specialists have access to a variety of tools, training and support that will enable us to help customers of all sizes design, architect, build, migrate, and manage their workloads and applications on AWS. Amazon’s Infrastructure-as-a-Service (IaaS) offering is currently one of the largest in the marketplace, with […]

Read More...

Kubernetes Security Enhanced In Release 1.4

Kubernetes Security Kubernetes 1.4 Enhances Security with TLS Bootstrap The open-source 1.4 release, which debuted Sept. 26, provides users with a host of enhanced Kubernetes security capabilities for container deployment and orchestration. Kubernetes originated at Google and is now part of the Cloud Native Computing Foundation, benefiting from the contributions of multiple vendors. Among the new […]

Read More...

Are You Ready For GDPR?

GDPR deadline fast approaching Start Preparing Now! The recent announcement on 31 October by the Secretary of State Karen Bradley MP that the UK will be implementing the EU General Data Protection Regulation (GDPR) is welcome news for many organisations concerned about the fast-approaching deadline of 25 May 2018. With the uncertainty removed around whether […]

Read More...

Security Technology Vision 2016: Empowering your cyber defenders

Learn why business leaders must establish sound defence and trust to survive in the digital age       Fighter pilots depend on artificial intelligence, cockpit automation and the latest virtual reality visualisation technologies to elevate their reaction times and abilities to peak levels. In the next five years, security professionals will employ similar technologies […]

Read More...

SCS Named a Leader in Cloud Services

SCS gains recognition as a leader in cloud professional services   SCS was named a leader in the TAC: Cloud Professional Services Startups 2016 Vendor Assessment, demonstrating the most promising strategies and capabilities among the 200 vendors included in the category. TAC’s assessment focused on 29 different strategies and capabilities, with positioning based on survey feedback from 126 of the evaluated […]

Read More...

AWS Force MFA Policy for IAM Admins

Whenever we take on a new customer, one of the very first security checks we perform is to ensure all users are leveraging multi-factor authentication (MFA). Customers often ask if there is a way to force all users to use MFA. While there is no simple checkbox for this, there is an IAM policy that can be applied to […]

Read More...