by Austin Karuru | Apr 7, 2025 | Amazon Web Services (AWS)
AWS Identity and Access Management (IAM) is the gatekeeper of your AWS cloud environment. Think of it as your organization’s security command center, where you control who gets access to what resources and under what conditions. In today’s cloud-first...
by Eddie Ngugi | Nov 1, 2023 | Blog
How to enhance your security posture in your enterprise cloud by wiping devices remote: Case for Google Workspace Episode 7: Remote Wipe Devices If a managed device goes missing or a user leaves your organization, you can use Google Admin console to wipe work or...
by Eddie Ngugi | Nov 1, 2023 | Blog
How to enhance your security posture in your enterprise cloud using Investigation Tool: Case for Google WorkspaceEpisode 6: Security Center: Investigation Tool Security investigation tool is used to identify, triage, and take action on security and privacy issues in a...
by Eddie Ngugi | Nov 1, 2023 | Blog
How to enhance your security posture in your enterprise cloud emails: Case for Google Workspace Episode 4: Data Loss Prevention (DLP) for Drive In this episode of enterprise cloud security on Google Workspace we will take a look on how to implement DLP for Drive...
by Eddie Ngugi | Oct 26, 2023 | Blog
How to enhance your security posture in your enterprise cloud emails: Case for Google WorkspaceEpisode 3: Data Loss Prevention for Gmail Data loss prevention (DLP) is a set of tools and processes used to ensure that sensitive data is not lost, misused, or accessed by...