Cloud

Docker Swarm vs Kubernetes: What’s the Most Secure Container Orchestrator?

Containers are being increasingly used and deployed by organizations of all sizes, with...

ShiftLeft Raises $9.3 Million, Exits Stealth Mode

ShiftLeft, a Santa Clara, Calif application security startup emerged from stealth on Oct. 11 after securing $9.3 million in a Series A...

Secure AWS Now: PHM Medical Records, Accenture Data Exposed Online

Despite all the attention that unsecured Amazon S3 buckets have gotten lately as...

VIPRE Cloud Brings Machine Learning to Next-Generation Anti-Malware

Cybersecurity is becoming an immensely complex subject to master, leaving many security...

The Cloud Breach Epidemic: Verizon, Viacom the Latest to Leak Sensitive Data

Security researchers recently came across vast amount of data belonging to both...

Cloud Security Error Exposes Half a Million Voters’ Personal Information

Another day, another cloud leak: Kromtech researchers recently came across a misconfigured CouchDB database exposing information on 593,328 Alaskan voters."When the database...

Misconfigured Cloud Servers Expose Millions of Customer Records

In a pair of major data breaches disclosed over the past few...

How Amazon Solved The Biggest Cloud Security Threat

Time and again, one research outfit or another will "discover" a breach...

Qualys Expands Cloud and SSL/TLS Security Services

Qualys is adding new services to its Software-as-a-Service cloud platform, providing customers...

A Reminder of Cloud Security Best Practices: Millions of Verizon Customers’ Data Exposed

UpGuard researcher Chris Vickery recently found as many as 14 million Verizon customers' names, addresses, account details and account PINs in a...

Latest articles

Database Security Best Practices

One reality of managing large organizations involves collecting massive amounts of sensitive data that is stored and managed in databases. This makes databases a...

ESET Product Review

Antivirus solutions have long been a staple of cybersecurity practices. However, antivirus is no longer enough to protect an entire organization's infrastructure.  Some antivirus solutions...

Kasada Product Review

Kasada is an automated bot detection and mitigation solution designed for enterprise web applications. Its aim is to stop bots from crashing websites, automating...

Crowdstrike Firewall Management Product Review

Crowdstrike's Firewall Management platform is a host firewall tool that centralizes defense against malware threats. It's a module within the broader Falcon endpoint protection...