Please turn on your JavaScript for this page to function normally.
money online
Most businesses to accelerate data security investments in 2021

71 percent of enterprise executives reported their organization’s data and AI timelines have accelerated since the onset of the COVID-19 pandemic, with one in four reporting …

cloud security experts
Cloud security skills in high demand

Cloud security is critically important for organizations across the globe as adoption of cloud infrastructure continues to grow at a rapid clip. The shift toward the cloud is …

How to rethink risks with new cloud deployments

These days, technology seems to evolve at the speed of light. Infrastructures change, attack surfaces reduce and multiply and, not surprisingly, your cloud environment …

cloud
Cloud security posture confidence is high, yet most IT pros have experienced a cloud-related breach

OpsCompass announced the results of a report it conducted on cloud security posture and management challenges. The report is based on survey responses from 253 full-time, …

cloud
Understanding the cloud shared responsibility model

Over the past year, we witnessed a transition to the cloud as companies had to quickly adjust to the almost instantaneous move to a remote work environment. But in many cases, …

Yor
Open-source tool Yor automatically tags IaC resources for traceability and auditability

Yor is an open-source tool from Palo Alto Networks that automatically tags cloud resources within infrastructure as code (IaC) frameworks such as Terraform, Cloudformation, …

AWS
Detecting attackers obfuscating their IP address inside AWS

Security researchers have documented an attack technique that may allow attackers to leverage a legitimate Amazon VPC feature to mask their use of stolen API credentials …

Secure your cloud: Remove the human vulnerabilities

Training to increase employees’ security awareness and change risky behaviours among end users is important, particularly as the future workplace will be hybrid and many …

cloud
Avoid these CSPM mistakes to increase your cloud security posture

Are you utilizing your cloud services to their fullest? In other words, do you have a comprehensive picture of what’s in your cloud, who put it there, and whether or not it’s …

Cloud
Cloud Sniper: Manage and automate cloud security operations

Cloud Sniper is an open-source platform for managing cloud security operations that aims to make it easy for cloud teams to deal with security incidents. “One of our …

cloud binary
Improper cloud IAM leaving organizations at risk

There is an industry-wide cloud permissions gap crisis, leaving countless organizations at risk due to improper identity and access management (IAM), a CloudKnox Security …

brain
Machine learning-powered cybersecurity depends on good data and experience

According to IDG’s 2020 Cloud Computing Study, 92% of organizations have at least some sort of cloud footprint in regard to their IT environment. Therefore, traditional cloud …

Don't miss

Cybersecurity news