Sharing our perspectives

The 3-GIS blog is full of insight on industry trends, new technologies, best practices, and more. Browse our latest posts below or use the drop-down menu to filter posts by category.

Hero icon

May 12, 2022 11:46:57 AM
  • cloud security

Cloud security blog series - Part 5: Auditing cloud security for improvement

According to predictions in The 2020 Data Attack Surface Report1, by 2025 there will be around 100 zettabytes of data stored in the cloud globally. That’s 100 billion (100 followed by 9 zeros) GBs. Total global data storage is projected to exceed 200 zettabytes by 2025. This includes data stored on private and public IT infrastructures, on utility infrastructures, on private and public cloud data centers, on personal computing devices — PCs, laptops, tablets, and smartphones — and on IoT (Internet-of-Things) devices.

Read More
Apr 4, 2022 7:45:22 AM
  • cloud security

Cloud security series - Part 4: Response to online threats during times of elevated risk

I'd like to focus on cyber security in times of heightened threats today. As we are in unprecedented times, we need to stay alert and be smarter about how we respond.

Read More
Feb 11, 2022 11:24:15 AM
  • cloud security

Cloud security series - Part 3: Threat detection and initial response in the cloud

Cloud environments change fundamental assumptions in how to perform threat detection and response. A growth of new infrastructure and deployment models results in new environments with new security models and attack surfaces. In particular, shared responsibility with a cloud service provider creates potential threat visibility gaps in the attack lifecycle.

Read More
Jan 21, 2022 4:28:41 PM
Article Article
  • cloud security

Cloud security series - Part 2: The importance of identity access management

Whenever you manage users who require access to multiple types of data in order to do their job or purchase a product, you need a strong set of standards to help you implement access controls and protect your information systems from cybersecurity threats. This is commonly known as “Identity and Access Management” (IAM).  Not only does IAM grant secure access to what you and your applications do, it also grants access to the many service-to-service calls that occur behind the scenes. An example of IAM in action is Amazon Web Service (AWS) IAM service handling more than 400 million API calls per second worldwide. Nonetheless, even if your organization only handles a single call per second, or minute, or even hour, IAM has never been more important than present day.

Read More
Dec 22, 2021 9:36:28 AM
  • cloud security

Cloud security series - Part 1: Preparation and strategy for cloud security

$74.6 billion. That’s the estimated amount to be spent on cloud IT infrastructure in 2021, according to Statista1. The explosive growth of cloud services is creating a unique set of challenges for enterprises seeking improved ways to secure their data.  

Read More
Sep 1, 2021 8:24:00 AM
Podcast Podcast
  • cloud security

The playbook for tackling cloud security in 2021

It should go without saying that many, if not most, companies have had to make some changes in the last 18 months. In an era when most facets of life are marked by a pandemic, remote-first culture, the ideology of having employees work from home, has had widespread adoption. In order for this to work, employees need access to data and work files from wherever they are working. This has led many companies to either adopt, or increase, working from the cloud. Whether or not this was the case previously, there are many reasons a company should not rush into it without a strategy and some specific considerations.

Read More