cloud security

CISO challenges and the path to cutting edge security
Zane Lackey is the co-founder and CSO at Signal Sciences, and the author of Building a Modern Security Program (O’Reilly Media). He serves on multiple Advisory Boards …

New security feature to prevent Amazon S3 bucket misconfiguration and data leaks
Hardly a week goes by that we don’t hear about an organization leaving sensitive data exposed on the Internet because they failed to properly configure their Amazon S3 …

Working from anywhere, keeping your files in sync and staying secure
Large, modern enterprises strive to achieve maximum productivity, so it’s no wonder most take advantage of the flexibility provided by remote working. People working …

Hybrid cloud complexity pushes organizations to look for more security tools
As more organizations embrace hybrid cloud – with more than 50 percent claiming a hybrid cloud setup – and serverless, now used by close to third of organizations, …

21% of all files in the cloud contain sensitive data
McAfee released its Cloud Adoption and Risk Report, which analyzed billions of events in anonymized customers production cloud use to assess the current state of cloud …

Organizations feel ready to put highly sensitive data in the cloud
Many corporate employees are ready to store highly sensitive data in the cloud. However, many are still skeptical of the security posture of their own organizations, according …

Safeguarding hybrid-cloud infrastructures through identity privilege management
Most enterprises have embraced the advantages a cloud infrastructure can bring to their computing, storage, network or other needs, and many are juggling multiple cloud …

Solving the cloud infrastructure misconfiguration problem
Security incidents involving cloud infrastructure have become a regular occurrence since many organizations began shifting their assets to the cloud. Many of these incidents …

Keeping your cloud malware-free: What you need to know
This year we’ve seen massive malware attacks spanning from nation state campaigns originating in North Korea and Russia to popular restaurants and everything in between. Each …

Most enterprises highly vulnerable to security events caused by cloud misconfiguration
Fugue released the results of its Cloud Infrastructure Misconfiguration Report. The survey of more than 300 IT professionals revealed that most enterprises are highly …

APTs are targeting IT service providers
Managed service providers (MSPs) and cloud service providers (CSPs) are under attack by advanced persistent threat (APT) groups, the U.S. Department of Homeland Security …

Software-defined networking is turning concern about security in the cloud on its head
In an era when enterprises always have to grapple with processing large amount of information through big data technology, security has emerged as the most important measure …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility