BEST PRACTICES
Three Lessons from the MongoHQ Breach
A textbook example of a solid response to a security incident. How did MongoHQ handle a data breach so decisively?
Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.
A textbook example of a solid response to a security incident. How did MongoHQ handle a data breach so decisively?
In this blog post, security professional and JumpCloud co-founder and CTO, Topher Marie, explains why he has a weak Twitter password.
A theme of the AWS re:Invent 2013 conference would have to be less ops, more dev - a key JumpCloud theme. Find out why this mean more innovation, too.
That is the real vulnerability of passwords - their reuse, but why? Topher, Maria, co-founder and CTO at JumpCloud, explains the dangers of password reuse.
Tip of the hat to AWS & Werner for inviting me and about 20 other co-founders / CTOs Tuesday night for an intimate conversation around technology.
It's JumpCloud’s first time exhibiting as we just launched the company in September at TechCrunch Disrupt, and it's at AWS re:Invent
The JumpCloud and SoftLayer hosted the first ever DevOps conference here in Boulder with about 30 companies and 75+ speakers
Vulnerabilities on the Internet aren't found in obvious places, since hackers don't just guess passwords. The real risks online lie on the back-end.
Thank you to our friends at Simplifilm for helping us craft a great video to highlight our company and Directory-as-a-Service® capabilities.
JumpCloud was selected out of hundreds of startups to present on stage as a finalist in the TechCrunch Disrupt San Francisco Battlefield competition.
The AWS IAM product is built to control access to the infrastructure of your Amazon virtual machines. JumpCloud manages who is using those machines.
It's important to discuss user management for startups and how to start off right. It's smart to put the right tools and procedures in place at the start