Skip to main content

Blog

blog

Operate With Security As A Service And Fix The Mess!

For many IT organizations, security is run as a sprawling mess across multiple technical teams, providers and applications development staff. Many operate with overlapping responsibilities and sometimes unclear boundaries of responsibilities. Presented here is an approach to inject sound service management operating strategies, responsibilities and approaches. In other words, treat Security as a set of strategic services versus “something technical people do”.

Randy Steinberg by Randy Steinberg

Windows Virtual Desktop Insights

In today's webinar, Concurrency CTO Nathan Lasnoski hosted a discussion on Windows Virtual Desktop (WVD) with Concurrency Technical Architect Brian Voelz. They discussed how WVD benefits organizations by supporting secure, scalable and efficient work whether end users are in-office or remote. Nathan and Brian walked through how you can leverage WVD to reduce physical desktop costs and increase efficiency by deploying virtual machines in minutes vs. days.

Stephanie Siewert by Stephanie Siewert

Cybersecurity Month - The Basics

Security is not always easy to talk about, but it is a necessity when you want to make sure that your organization's hard earned dollars and intellectual property are protected.

Laura Spence by Laura Spence

The Importance of Zero Trust Security

Security is more important now than ever as the number of targeted security attacks and data breaches continue to rise. Adopting a Zero Trust Security model boosts your network's security and protects data, files, and user information. Concurrency's CTO Nathan Lasnoski, Managing Architect Chris Blackburn and Technical Architect Laura Spence break down Zero Trust's approach to security including why Modern Desktop and Micro-segmentation play a critical role.

Stephanie Siewert by Stephanie Siewert

Securing and Governing the Power Platform

The Power Platform is compelling with its low-code/no-code capabiltiies, but how do you secure and govern it across your enterprise? Making decisions on structure and governance will set your employees up for success. 

Stephanie Siewert by Stephanie Siewert

Executive Summary: Security Webinar

Brunswick Corporation's Cheif Information Security Officer Alan Mitchell recently discussed the crucial process of making your company secure and ready for when security threats strike.

Stephanie Siewert by Stephanie Siewert

What is a Bastion Host?

Security is one of the many cornerstones of IT and a focus of what we do at Concurrency. When building in Azure, it is important to be able to connect to your resources securely. Bastion hosts are the common way to provide administrative access to private areas of your cloud network.

Paul Harris by Paul Harris

Instance Security Center

Introduced in the Madrid release of ServiceNow, Instance Security Center is a new and improved version of the instance security dashboard that was introduced in Jakarta. The new security center gives you a Centralized Compliance view of security PKIs that will allow you to get a baseline of the security events in your instance every day. Additionally, Security Center provides you with a daily compliance Score, Predefined Audit Control Categories, Built-in Remediation guidance, email tracking.

Rob Plank by Rob Plank

Single Sign-On in the Wild

A rash of rogue food orders with the company Deliveroo allowed hungry hackers to go on a booze and food binge in 2016—they logged in to customers’ accounts, changed delivery addresses, and ordered whatever they pleased.

Karsten Huttelmaier by Karsten Huttelmaier