Change layout
VPN data leaks protection

How to Check Your VPN for Data Leaks

How to Check Your VPN for Data Leaks

Just a few short years ago, virtual private networks (VPNs) were a novel technology to the masses. The advanced security and anonymity they offered were only for paranoids and dissidents. Fast forward to today’s internet with its daily headlines of massive data breaches, government snooping, and a Dark Web with an endless appetite for your personal information. Continue reading

Don’t miss new articles!
Thank you for subscribing!
Don’t miss new articles!
Thank you for subscribing!
Resize Amazon Volume

How to Resize an Amazon Elastic Block Store Volume

How to Resize an Amazon Elastic Block Store Volume

Reaching a capacity limit in Amazon Elastic Block Storage (EBS)? Need more IOPS for an app or web-service? Due to its design, Amazon EBS doesn’t allow to scale the volume size dynamically or extend volume IOPS. If a user needs more space, he has to buy another Amazon EBS volume and then spend hours to backup data from the original volume, verify its consistency and then restore on the new one.

This article is a step-by-step guide on how to use AWS built-in features to easily resize the Amazon EBS volume.
Continue reading

IAM Identities

Amazon S3 Security Part 3: IAM Identities

Amazon S3 Security Part 3: IAM Identities

This is the third article in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we looked at writing identity-based policies to manage access to your S3 resources. In this Part III, we will cover authentication and identity within the context of AWS Identity and Access Management (IAM). Continue reading

IAM Identities

AWS Security Part 2: Basics of IAM Policies

AWS Security Part 2: Basics of IAM Policies

This is the second in a three-part series on Amazon S3 Security In-Depth. In Part I of this series, we discussed the different mechanisms you can use to allow access to your Amazon S3 buckets and objects. In Part II, we will take a deeper look at managing access to your S3 resources using AWS Identity and Access Management (IAM). Continue reading

Office 365 Hybrid Migration

Office 365 Hybrid Migration

Office 365 Hybrid Migration

Many organizations decide to skip the expense of maintaining an on-premises Exchange server and migrate to Office 365, which offloads the server to the Microsoft cloud (see all the reasons why it's time to perform Exchange to Office 365 migration). Once that decision has been made, the next step is to decide on the type of migration. In this article, we will overview the main types of Exchange cloud migration. Continue reading

IAM Identities

AWS Security Part 1: ACLs vs Bucket Policies vs IAM

AWS Security Part 1: ACLs vs Bucket Policies vs IAM

To use Amazon S3 effectively, you need to be aware of the security mechanisms provided by AWS to control your S3 resources. This is the first part in a three-part series on S3 security. In this part, we will discuss the three different access control tools provided by AWS to manage your S3 resources. Continue reading

Load more