News and perspectives from the world of fiber optic networking

There's a lot to say in the world of fiber optic networking - planning, design, mapping, technology, software, database, permitting, dark fiber, fiber-to-the-home. The experienced network professionals of 3-GIS know the challenges you face & implement solutions daily.

Hero icon

Dec 30, 2022 10:13:00 AM
  • Cloud security
  • Press

Along the Path: How can we boost our fiber deployment plans for 2023

Welcome to the Q4 edition of Along the Path. In this edition, we focus on ways to boost our fiber deployment plans for 2023 as we wrap up 2022.

Read More
Sep 30, 2022 4:27:00 PM
  • Cloud security
  • Press

Along the path: What you need to know about cloud security

Welcome to the 2022 Q3 edition of Along the Path. This edition focuses on cloud security, lift and shift best practices, and how desktop and cloud deployments compare.

Read More
May 12, 2022 11:46:57 AM
  • Cloud security

Cloud security-Part 5:Auditing cloud security for improvement

According to predictions in The 2020 Data Attack Surface Report1, by 2025 there will be around 100 zettabytes of data stored in the cloud globally. That’s 100 billion (100 followed by 9 zeros) GBs. Total global data storage is projected to exceed 200 zettabytes by 2025. This includes data stored on private and public IT infrastructures, on utility infrastructures, on private and public cloud data centers, on personal computing devices — PCs, laptops, tablets, and smartphones — and on IoT (Internet-of-Things) devices.

Read More
Apr 4, 2022 7:45:22 AM
  • Cloud security

Cloud security-Part 4:Response to online threats during times of elevated risk

I'd like to focus on cyber security in times of heightened threats today. As we are in unprecedented times, we need to stay alert and be smarter about how we respond.

Read More
Feb 11, 2022 11:24:15 AM
  • Cloud security

Cloud security-Part 3:Threat detection & initial response in the cloud

Cloud environments change fundamental assumptions in how to perform threat detection and response. A growth of new infrastructure and deployment models results in new environments with new security models and attack surfaces. In particular, shared responsibility with a cloud service provider creates potential threat visibility gaps in the attack lifecycle.

Read More
Jan 21, 2022 4:28:41 PM
Article Article
  • Cloud security

Cloud security-Part 2: The importance of Identity Access Management

Whenever you manage users who require access to multiple types of data in order to do their job or purchase a product, you need a strong set of standards to help you implement access controls and protect your information systems from cybersecurity threats. This is commonly known as Identity and Access Management (IAM).  Not only does IAM grant secure access to what you and your applications do, it also grants access to the many service-to-service calls that occur behind the scenes. An example of IAM in action is Amazon Web Service (AWS) IAM service handling more than 400 million API calls per second worldwide. Nonetheless, even if your organization only handles a single call per second, or minute, or even hour, IAM has never been more important than present day.

Read More
Dec 22, 2021 9:36:28 AM
  • Cloud security

Cloud security-Part 1:Preparation and strategy for cloud security

$74.6 billion. That’s the estimated amount to be spent on cloud IT infrastructure in 2021, according to Statista1. The explosive growth of cloud services is creating a unique set of challenges for enterprises seeking improved ways to secure their data.  

Read More
Sep 1, 2021 8:24:00 AM
Podcast Podcast
  • Cloud security

The playbook for tackling cloud security in 2021

It should go without saying that many, if not most, companies have had to make some changes in the last 18 months. In an era when most facets of life are marked by a pandemic, remote-first culture, the ideology of having employees work from home, has had widespread adoption. In order for this to work, employees need access to data and work files from wherever they are working. This has led many companies to either adopt, or increase, working from the cloud. Whether or not this was the case previously, there are many reasons a company should not rush into it without a strategy and some specific considerations.

Read More