cloud security
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
How to implement least privilege in the cloud
According to a recent survey of 241 industry experts conducted by the Cloud Security Alliance (CSA), misconfiguration of cloud resources is a leading cause of data breaches. …
![SaltStack](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/04123031/saltstack-fire-400x200.jpg)
SaltStack Salt vulnerabilities actively exploited by attackers, patch ASAP!
Two vulnerabilities in SaltStack Salt, an open-source remote task and configuration management framework, are being actively exploited by attackers, CISA warns. About …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094858/cloud-400x200.jpg)
Protecting corporate data in popular cloud-based collaborative apps
Cloud adoption has grown at an astonishing rate, providing organizations with the freedom to store data in numerous cloud applications that meet their specific business …
![BYOK](https://img.helpnetsecurity.com/wp-content/uploads/2020/04/20090256/byok-400x200.jpg)
Multi-cloud key management and BYOK
Cloud providers such as Google Cloud Platform, AWS, and Microsoft Azure work hard to be the service provider of choice for enterprise customers. They often push the envelope …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093806/cloud1-400x200.jpg)
On my mind: Transitioning to third-party cloud services
During this extended period of social distancing filled with increased online activity, I can’t help but reflect on all the user data that has been created, stored, hacked, …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100537/cloud-1-400x200.jpg)
Shift to work-from-home: Most IT pros worried about cloud security
As most companies make the rapid shift to work-from-home to stem the spread of COVID-19, a significant percentage of IT and cloud professionals are concerned about maintaining …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/12/09105618/cloud-400x200.jpg)
You have to consider cybersecurity at all points of a cloud migration
Human error and complex cloud deployments open the door to a wide range of cyber threats, according to Trend Micro. Cloud security issues Gartner predicts that by 2021, over …
![cloud storage](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102525/cloud_storage-400x200.jpg)
Enterprises regard the cloud as critical for innovation, but struggle with security
Most enterprises (85%) believe embracing the public cloud is critical to fuel innovation, but the majority are not equipped to operate in the cloud securely, according to a …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093806/cloud1-400x200.jpg)
While many migrate security tools to the cloud, concerns remain
While many companies are beginning to migrate security tools to the cloud, a significant number have concerns, a survey by Exabeam reveals. The survey highlights data privacy, …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09095945/cloud2-400x200.jpg)
Cloud-native security considerations for critical enterprise workloads
Since the advent of the public cloud as a viable alternative to on-premise systems, CIOs and CISOs have been citing security as one of the top concerns when it comes to making …
![cloud storage](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102525/cloud_storage-400x200.jpg)
Applying the 80/20 rule to cloud security
The 80/20 rule, which was first introduced as Pareto’s principle in 1941 by American engineer Joseph Juran, suggests that 20 percent of your activities (in life, business, …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112041/cloud-400x200.jpg)
Multi-cloud and edge deployments threatened by security and connectivity problems
Organizations face major infrastructure and security challenges in supporting multi-cloud and edge deployments, according to a Volterra survey of more than 400 IT executives. …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD