misconfiguration
![cloud security](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29120648/cloud_security-1-400x200.jpg)
Building a strong cloud security posture
In this Help Net Security video, David Kellerman, Field CTO at Cymulate, discusses how cloud security still seems to lag even as the cloud grows in popularity and usage. Many …
![cloud security](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/15172500/cloud_security-1400-400x200.jpg)
Common cloud security mistakes and how to avoid them
According to recent surveys, 98% of organizations keep their financial, business, customer and/or employee information in the cloud but, at the same time, 95% of cloud …
![target](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/25133918/target2-400x200.jpg)
DIY attack surface management: Simple, cost-effective and actionable perimeter insights
Modern-day attack surface management (ASM) can be an intimidating task for most organizations, with assets constantly changing due to new deployments, assets being …
![eyes](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/19143700/eyes-400x200.jpg)
How to avoid the 4 main pitfalls of cloud identity management
Securing cloud identities isn’t easy. Organizations need to complete a laundry list of actions to confirm proper configuration, ensure clear visibility into identities, …
![Adrien Petit](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/29110531/adrien_petit-2-uncovery-400x200.jpg)
The blueprint for a highly effective EASM solution
In this Help Net Security interview, Adrien Petit, CEO at Uncovery, discusses the benefits that organizations can derive from implementing external attack surface management …
![cloud](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/25142723/cloudfiles1-400x200.jpg)
Experts demand clarity as they struggle with cloud security prioritization
Cloud Native Application Protection Platforms (CNAPPs) have emerged as a critical category of security tooling in recent years due to the complexity of comprehensively …
![Kennedy Torkura](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131056/kennedy_torkura-2-mitigant-400x200.jpg)
Maintaining consistent security in diverse cloud infrastructures
As cloud infrastructures become increasingly API-driven and dynamically spread across expansive attack surfaces, achieving clarity proves difficult. Compounding this challenge …
![kubernetes](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/13214620/kubernetes-logo-400x200.jpg)
Kubernetes clusters face widespread attacks across numerous organizations
In this Help Net Security video, Assaf Morag, Lead Threat Intelligence Analyst at Aqua Security, discusses research that discovered openly accessible and unprotected …
![Apache Superset](https://img.helpnetsecurity.com/wp-content/uploads/2023/04/26154157/apache-superset-400x200.jpg)
Common insecure configuration opens Apache Superset servers to compromise
An insecure default configuration issue (CVE-2023-27524) makes most internet-facing Apache Superset servers vulnerable to attackers, Horizon3.ai researchers have discovered. …
![cloud money](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093749/cloud-money1-400x200.jpg)
Financial organizations more prone to accidental data leakage
Netwrix announced additional findings for the financial and banking sector from its global 2022 Cloud Security Report. Compared to other industries surveyed, financial …
![Brad Jones](https://img.helpnetsecurity.com/wp-content/uploads/2022/11/28095217/brad_jones-2-seagate-400x200.jpg)
The cybersecurity trends organizations will soon be dealing with
In this interview with Help net Security, Brad Jones, VP of Information Security at Seagate Technology, talks about cybersecurity trends organizations will be dealing with …
![USA](https://img.helpnetsecurity.com/wp-content/uploads/2019/09/09093113/usa-flag-400x200.jpg)
Security “sampling” puts US federal agencies at risk
Titania launched an independent research report that uncovers the impact of exploitable misconfigurations on the security of networks in the US federal government. The study, …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders