Navisite Blog
The Navisite team brings to our clients an array of industry and technology experience and lessons. The blog, contributed to by a cross-section of the Navisite organization, provides insights on the latest product developments, technology and cloud computing trends, and perspective on the greater IT landscape. Be sure to sign up for the weekly roundup to be delivered to your email every Friday.
Get weekly updates from our blog. Subscribe now.
Thank you for subscribing.

Navisite becomes a member of the Cloud Security Alliance
Changappa Kodendera
What is the Cloud Security Alliance? The Cloud Security Alliance (CSA) is a global a not-for-profit (501(c)6) organization dedicated to promoting security assurance within cloud computing by...
more
The Top 5 Cloud Security Threats You Face Right Now
Changappa Kodendera
Cloud computing has become an integral aspect of corporate IT, offering virtually infinite flexibility and scalability to support changing strategic goals and operating needs. However, like any...
more
Why threat hunting should be a security priority for every business
Dan Pitman
Every IT manager knows the importance of IT security and implements provisions accordingly. Unfortunately, many of these provisions are reactive; processes that are enacted after an attack has taken...
more
It’s Time to Centralize and Control Your IT Security Tools
Dan Pitman
IT security is now a strategic necessity. Aside from regulatory and legal obligations, your business has a duty to protect its customers’ privacy and security too. One estimate published by Ponemon...
more
Considerations when migrating from AWS to Azure
Mike Gallo
As public cloud has become an integral part of any organization’s cloud strategy, cloud migration has been a much-discussed topic. The on-premises-to-public cloud migration (whether Azure, AWS or...
more
How does GDPR apply to IT security professionals?
Changappa Kodendera
The General Data Protection Regulation (GDPR) came into force on 25 May 2018. Along with tightening up data protection rules for all businesses handling personal data of EU citizens, it also extends...
more
If Cybercriminals Never Sleep, How Do You Protect Your Systems ‘round the Clock?
Changappa Kodendera
In the always-on global marketplace, your systems need to be available 24x7x365 to ensure that customers can reach you (or your services) whenever they choose. Cloud platforms have helped to meet...
more
Preparing for a successful Azure migration process
Dave Williams
Ed Broking is a wholesale insurance and reinsurance broker, sourcing policies and coverage across a broad range of industries. Based in London, Ed Broking operates a number of international offices...
more
Attracting Diverse Talent: How Collaboration is Key
Duncan MacDonald
As unemployment rates continue to fall, key skills are becoming much harder (and more expensive) to find. Businesses who are tied to traditional operating models may find that they are at an...
more
Empowering Business Collaboration
Duncan MacDonald
True empowerment comes from equipping your employees with the tools (and skills) they need to find information, contact key individuals and to share their own experience and knowledge as easily as...
more