Please turn on your JavaScript for this page to function normally.
Alex Freedland
Strategies for CISOs navigating hybrid and multi-cloud security

In this Help Net Security interview, Alex Freedland, CEO at Mirantis, discusses the cloud security challenges that CISOs need to tackle as multi-cloud and hybrid environments …

AWS
AWS security essentials for managing compliance, data protection, and threat detection

AWS offers a comprehensive suite of security tools to help organizations manage compliance, protect sensitive data, and detect threats within their environments. From AWS …

Google Cloud Platform
All Google Cloud users will have to enable MFA by 2025

Google has announced that, by the end of 2025, multi-factor authentication (MFA) – aka 2-step verification – will become mandatory for all Google Cloud accounts. …

cloud
Evolving cloud threats: Insights and recommendations

Recently, IBM X-Force released its 2024 Cloud Threat Landscape Report. This uses incident data and insights to reveal how attackers successfully compromise organizations by …

Eye
Microsoft lost some customers’ cloud security logs

Microsoft has lost several weeks of cloud security logs that its customers rely on to spot cyber intrusions. What happened As reported by Business Insider earlier this month, …

Amiram Shachar
Transforming cloud security with real-time visibility

In this Help Net Security interview, Amiram Shachar, CEO at Upwind, discusses the complexities of cloud security in hybrid and multi-cloud environments. He outlines the need …

cloud security
Three hard truths hindering cloud-native detection and response

According to Gartner, the market for cloud computing services is expected to reach $675 billion in 2024. Companies are shifting from testing the waters of cloud computing to …

Cryptomator
Cryptomator: Open-source cloud storage encryption

Cryptomator offers open-source, client-side encryption of your files in the cloud. It’s available for Windows, Linux, macOS and iOS. Cryptomator works with Dropbox, …

cloud
Hide yo environment files! Or risk getting your cloud-stored data stolen and held for ransom

Cybercriminals are breaking into organizations’ cloud storage containers, exfiltrating their sensitive data and, in several cases, have been paid off by the victim …

Scout Suite
Scout Suite: Open-source cloud security auditing tool

Scout Suite is an open-source, multi-cloud security auditing tool designed to assess the security posture of cloud environments. By leveraging the APIs provided by cloud …

cloud
Misconfigurations and IAM weaknesses top cloud security concerns

Traditional cloud security issues often associated with cloud service providers (CSPs) are continuing to decrease in importance, according to the Top Threats to Cloud …

AI
Enhancing threat detection for GenAI workloads with cloud attack emulation

Cloud GenAI workloads inherit pre-existing cloud security challenges, and security teams must proactively evolve innovative security countermeasures, including threat …

Don't miss

Cybersecurity news