Cloud Security

A98c8f7dbb46467b790e2ac1fbbd3f50

Every Business Can Have Visibility into Advanced and Sophisticated Attacks

June 18, 2018 Added by:Liviu Arsene

Building a strong security ecosystem is about having both the shield and the sword working together to increase the overall security posture of the organization.

Comments  (0)

0e4d50f3874398fa86bb0633f1cd7ee4

How to Prevent Cloud Configuration Errors

May 29, 2018 Added by:Reuven Harrison

With unified visibility into the whole network, at all levels, IT managers will be able to strike a balance between security and functionality.

Comments  (0)

259aa33b32fc31717e8a18f2dc9edc19

The AWS Bucket List for Security

May 23, 2018 Added by:Avishai Wool

Professor Avishai Wool, CTO and co-founder at AlgoSec, looks at how organizations can ensure network security is extended to AWS environments

Comments  (0)

B5e8617f76698eb78f0101a3db9326ae

Achieving Effective Application Security in a Cloud Generation

May 16, 2018 Added by:Jonathan Bregman

Cloud application security requires new approaches, policies, configurations, and strategies that both allow organizations to address business needs and security risks in unison.

Comments  (0)

A98c8f7dbb46467b790e2ac1fbbd3f50

Understanding the Role of Multi-Stage Detection in a Layered Defense

May 08, 2018 Added by:Liviu Arsene

It’s important to understand that the increased sophistication of threats requires security technologies capable of covering multiple stages of attack.

Comments  (0)

D984d097fe7d91c5f11b79f9877ed9bc

Cloud Security Alert – Log Files Are Not the Answer

April 18, 2018 Added by:Lora O'Haver

Once production applications and workloads have been moved to the cloud, re-evaluating the company’s security posture and adjusting the processes used to secure data and applications from cyberattacks are critical next steps.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Avoiding Holes in Your AWS Buckets

April 12, 2018 Added by:Sanjay Kalra

Amazon Web Services (AWS) S3 buckets are the destination for much of the data moving to the cloud, and many have been mistakenly misconfigured and left open to public access.

Comments  (0)

E8643ec2aea49d246d020cf412aa5d05

Is Blockchain Really Disruptive in Terms of Data Security?

March 26, 2018 Added by:Mary Callahan

Blockchain can provide transparency, decentralization, efficiency, security, and other benefits, revolutionizing multiple industries.

Comments  (0)

Fcd5ebcc1f75461bbe843246f54c190e

Today's Threat Landscape Demands User Monitoring

February 27, 2018 Added by:Eric Sun

For a complete picture of user behavior, you need visibility both on and off the corporate network.

Comments  (0)

86e0caefdf114afad6827dea09ba79c6

What Global Manufacturers Need to Know About Security in the Cloud

January 08, 2018 Added by:Srivats Ramaswami

Entrusting data to a cloud-based application or cloud services provider is a major step, and manufacturers need to fully educate themselves about the security risks and advantages of cloud-based software.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Goodbye 2017, Hello 2018: New and Old Cloud Security Challenges

December 22, 2017 Added by:Sanjay Kalra

Security and compliance are going to be hot topics in 2018 as more and more organizations confront the challenges of the cloud.

Comments  (0)

514b3f589bbd84a29829326fa66dafcd

Unidentified Leak Paths Led to Successful Hack of South Korean Military by North Korea – Part I

December 11, 2017 Added by:Sanjay Raja

Continuous changes to the network landscape, including infrastructure, operating systems, and applications can cause organizational security policy and network defense configuration to become misaligned.

Comments  (0)

708a1c1e996937464e2d045763bf3fc4

4 Questions Businesses Must Ask Before Moving Identity into the Cloud

November 08, 2017 Added by:Dave Hendrix

Whether you’re moving from an on-premise identity governance solution to the cloud or implementing a cloud-based identity governance solution for the first time, it’s important to take a close look at your organization and its needs before taking the next step.

Comments  (0)

0e4d50f3874398fa86bb0633f1cd7ee4

Calming the Complexity: Bringing Order to Your Network 

October 20, 2017 Added by:Reuven Harrison

With multiple vendors and platforms in play, a growing number of devices connecting to the network and the need to manage it all – it’s easy to see why organizations can feel overwhelmed, unsure of the first step to take towards network management and security.

Comments  (0)

B68c8cbebf6b412d9fd4f9d0950a5901

Why Cloud Security Is a Shared Responsibility

October 13, 2017 Added by:Sanjay Kalra

If you’re about to join the cloud revolution, start by answering these questions: how are security responsibilities shared between clients and cloud vendors? And why do on-premises security solutions fail in the cloud?

Comments  (0)

02fe982eecea0dda30ffa3657a08097b

How to Choose the Right Data Protection Strategy

August 02, 2017 Added by:Dave Packer

A deep dive on data protection solutions and how they fit unique needs.

Comments  (0)

Page « < 1 - 2 - 3 - 4 - 5 > »