Cloud Computing
2019, The Year Ahead in Cloud Security
January 02, 2019 Added by:Peter Martini
In 2019, cloud security will confound organizations as concerns over data privacy, and the security skills gap pervade. But the cloud will come to its rescue.
Comments (0)
Addressing the CISO’s Key Challenges in 2018 and Beyond with Endpoint Detection and Response
November 12, 2018 Added by:Liviu Arsene
Today more than ever, incident response teams need to be given the tools to analyze and investigate suspicious activities, and adequately respond to evolving threats.
Comments (0)
6 Ways to Use CloudTrail to Improve AWS Security
October 02, 2018 Added by:Sanjay Kalra
Managing security in Amazon Web Services (AWS) is not a set-it-and-forget-it type of proposition.
Comments (0)
Under Expanding Cyber Siege, CISOs Admit Clear Visibility on Attacks Is a Challenge
September 12, 2018 Added by:Liviu Arsene
Increasingly, CISOs recognize that visibility must be relevant if they want to efficiently contain breaches and not waste precious time on a witch-hunt.
Comments (0)
Conceptual and Technical Challenges in Multi-cloud Security
August 30, 2018 Added by:Zohar Alon
Becoming an expert with one cloud platform takes a lot of time and working with multiple clouds at the same time is more difficult and can make teams prone to errors.
Comments (0)
Cryptojacking – More than a Nuisance, It Poses a Serious Threat to Data Centers
August 02, 2018 Added by:Liviu Arsene
Pre-execution security technologies coupled with core antimalware technologies can effectively detect and not just block the cryptojacking payload, but also prevent the attack from occurring.
Comments (0)
Plug Your Cloud Cybersecurity Holes
July 26, 2018 Added by:Marie Hattar
Threat detection and analytics are only as effective as the granularity the network infrastructure provides for packet access.
Comments (0)
Memory Protection beyond the Endpoint
July 16, 2018 Added by:Liviu Arsene
Re-engineering security solutions to fit the new infrastructure, performance, and scalability needs of organizations is crucial as advanced threats often exploit security blind spots.
Comments (0)
Every Business Can Have Visibility into Advanced and Sophisticated Attacks
June 18, 2018 Added by:Liviu Arsene
Building a strong security ecosystem is about having both the shield and the sword working together to increase the overall security posture of the organization.
Comments (0)
How to Prevent Cloud Configuration Errors
May 29, 2018 Added by:Reuven Harrison
With unified visibility into the whole network, at all levels, IT managers will be able to strike a balance between security and functionality.
Comments (0)
The AWS Bucket List for Security
May 23, 2018 Added by:Avishai Wool
Professor Avishai Wool, CTO and co-founder at AlgoSec, looks at how organizations can ensure network security is extended to AWS environments
Comments (0)
Achieving Effective Application Security in a Cloud Generation
May 16, 2018 Added by:Jonathan Bregman
Cloud application security requires new approaches, policies, configurations, and strategies that both allow organizations to address business needs and security risks in unison.
Comments (0)
Understanding the Role of Multi-Stage Detection in a Layered Defense
May 08, 2018 Added by:Liviu Arsene
It’s important to understand that the increased sophistication of threats requires security technologies capable of covering multiple stages of attack.
Comments (0)
Cloud Security Alert – Log Files Are Not the Answer
April 18, 2018 Added by:Lora O'Haver
Once production applications and workloads have been moved to the cloud, re-evaluating the company’s security posture and adjusting the processes used to secure data and applications from cyberattacks are critical next steps.
Comments (0)
Avoiding Holes in Your AWS Buckets
April 12, 2018 Added by:Sanjay Kalra
Amazon Web Services (AWS) S3 buckets are the destination for much of the data moving to the cloud, and many have been mistakenly misconfigured and left open to public access.
Comments (0)
Is Blockchain Really Disruptive in Terms of Data Security?
March 26, 2018 Added by:Mary Callahan
Blockchain can provide transparency, decentralization, efficiency, security, and other benefits, revolutionizing multiple industries.
Comments (0)
- The Rise of Ransomware and the Consequences for SMBs
- Trump Administration Starts the Ball Rolling with the National Cyber Strategy
- A Call to Structure
- What CEOs Need to Know About the Future of Cybersecurity
- Who’s Responsible for Your Cyber-Security?
- CERT/CC Warns of Vulnerabilities in Marvell Avastar Wireless SoCs
- Mozilla Concerned of Facebook’s Lack of Transparency
- OWASP: What Are the Top 10 Threats and Why Does It Matter?
- Magento Patches Command Execution, Local File Read Flaws
- The Biggest Security Hurdles in Your Business, and How to Overcome Them