ZDNet | Microsoft last week made available a preview of a new Azure Dedicated Host service, designed to allow users to run virtual machines in a single-tenant servers. Microsoft rivals AWS and Google Cloud already offer similar dedicated services. The Azure Dedicated Host option is aimed at companies with compliance requirements in terms of physical security, data integrity, and monitoring. It also is for IT orgs that want and need host-level isolation.
TechTarget | When European car-sharing startup Drivy becomes Getaround this fall, a SaaS management tool will integrate the two companies' IT systems, an increasingly common need for businesses. Read about how Drivy's IT manager is using BetterCloud to merge Drivy's SaaS applications into those of the new parent company.
Medium | "I’ll be sharing about the critical vulnerability that I happened to find in Jira (an Atlassian task tracking systems/project management software), or more specifically a misconfiguration issue which caused the leakage of internal sensitive information from organizations and companies," says author Avinash Jain. Read what he discovered about this vulnerability and the massive companies that are impacted.
ZDNet | There are 188,620 extensions available on the Chrome Web Store, and while you might think this provides a wide variety of choices for Chrome users, in reality, most of these extensions are dead or dwindling, with very few having active installations.
Security Boulevard | Everyone will at some point see a standard phishing email. Be it the 409 Scam (Nigerian Prince) or even a fake password reset, these are pretty easy to spot, and most people delete it without flinching. However, for the select few who have been on the receiving end of a spear phish, it’s often a more memorable experience. Phishing is social engineering using digital methods for malicious purposes. And spear phishing is just that much more effective because it involves a great deal of research on the intended target, and then uses that information to breach a network or for financial gain. It’s often the number one weapon of choice by threat actors that lead to a successful Business Email Compromise (BEC) attack.
MakeUseOf | Google Docs has become a common tool for anyone who needs to create a document. A lot of you are already familiar with the desktop version, and it may already be an indispensable tool. If not, it can become the hub for your documents when you are traveling. Imagine you don’t have access to your laptop on the road and you need to review a document. This situation is tailormade for the mobile version of Google Docs. Here's how it works.
SAASupdate
Several People are Typing | No SaaS updates again today. Instead, check out this article from Slack. When you realize you’ve got a serious challenge managing conflict in the workplace, don’t panic. No matter how tense things are, there are resources and strategies at your disposal. Here are some steps you can take to assess the situation, create shared understanding, and produce a resolution—you just need to be willing to do the work.
Twitter   FaceBook   LinkedIn   Google+