Cloud Security | News, how-tos, features, reviews, and videos
Consider this advice to successfully replace a perimeter approach to security with a zero trust framework.
“Shared responsibility” usually means that no one is responsible for minding the gap. Don’t fall in.
A SaaSBOM will provide greater visibility into the components of cloud-based software infrastructure. This proposal shows how to begin to develop one.
The global cybersecurity skills shortage is as bad as it has ever been, and most organizations are feeling the pinch, new research finds. But cybersecurity professionals have many recommendations for addressing this situation.
Organizations are planning for secure access service edge (SASE) but have questions on how to get from their current state to converged, cloud-delivered networking and security. They’ll be looking for answers at RSA.
Microsoft's apparent misconfiguration of its own cloud bucket exposed third-party intellectual property. Here are the takeaways for CISOs.
Increasing scale and complexity have made keeping up with security hygiene and posture management cumbersome and error prone, leaving organizations exposed. Here's what leading CISOs are doing to close the gap.
Attackers are either targeting admins for hosted services with phishing campaigns or exploiting mistakes made when setting them up. Here's what to watch out for.
Multicloud environments can work to organizations’ advantage, so long as there is an overarching strategy in place for cloud security.
Organizations must prepare for collecting, processing, analyzing, and acting upon terabytes of security data.