CloudLock Blog

May 26, 2015

Cloud Cybersecurity: The Buyer’s Guide

Michael Gleason
Cloud Cybersecurity: The Buyer’s Guide

It’s no secret that more organizations are adopting cloud applications than ever before – but where does that leave security professionals looking…

May 21, 2015

This is CloudLock!

Ed Nathanson
This is CloudLock!

Work (noun) – the result of exertion, labor, or activity; a deed or performance. If you look at the actual definition of…

May 18, 2015

The Office 365 Security Lowdown for IT Pros

Michael Gleason
The Office 365 Security Lowdown for IT Pros

It’s no mystery that Microsoft has doubled down on cloud related endeavors as of late. In fact, Microsoft’s commercial cloud revenue grew…

Tags:

May 06, 2015

5 Helpful Office 365 Business Tips to Know and Love

Michael Gleason
5 Helpful Office 365 Business Tips to Know and Love

There’s been no shortage of buzz around Microsoft Office 365, including the recent announcement that the Office 365 desktop apps will support…

Tags:

April 28, 2015

Cloud Cybersecurity: The Extended Perimeter and Third-Party Apps

Ayse Kaya Firat
Cloud Cybersecurity: The Extended Perimeter and Third-Party Apps

In our recent report, we focused on cloud cybersecurity trends and considerations in light of the extended perimeter. This was examined in…

Browser Not Supported

Your browser version is outdated.

We would recommend you upgrade to a recent version to ensure that you have a good experience on the CloudLock site. Outdated browsers also increase your security risk. So please update your browser and come back later!

Click on the icon below to download the latest version of your browser

Close