Cloud

Top CASB Security Vendors for 2021

Any cloud-based infrastructure needs a robust cloud access security broker (CASB) solution to ensure data and application...

Remote Work Security: Priorities & Projects

Each year, Gartner analysts recommend 10 security projects that combine high business impact with high risk reduction. Privileged access management (PAM) topped the list...

Top Cloud Security Companies & Tools

Cloud computing has become ubiquitous because of its agility and cost savings — but...

Cloud Security Requires Visibility, Access Control: Security Research

Cloud computing has been one of the most ubiquitous trends in modern IT, bringing...

Data Storage Security: Best Practices for Security Teams

Data storage security involves protecting storage resources and the data stored on them –...

What is Serverless Computing Security?

Serverless computing is among the newest trends in cloud computing and...

How Netflix Secures AWS Cloud Credentials

LAS VEGAS - Netflix has long been the poster child for being...

An Inside Look at OpenStack Security Efforts

The open source OpenStack cloud platform is used by major corporations such as Walmart, the world's largest carriers, such as AT&T, and...

122 Million U.S. Households’ Personal Information Exposed Online

UpGuard researchers yesterday disclosed yet another massive data leak due to a misconfigured...

How Google Encrypts Data in the Cloud

Google operates one of the largest cloud networks on the planet and uses multiple techniques to keep the data that moves across...

Latest articles

Check Point vs Palo Alto: EDR Solutions Compared

This is one of those articles that's fun to write because there is virtually no downside to these two endpoint detection and response (EDR)...

XDR Emerges as a Key Next-Generation Security Tool

Corporate networks are complex, and so is the myriad of cybersecurity solutions that protect them. Trying to manage all the security tools in a...

Best Encryption Tools & Software for 2020

Enterprises can invest in state of the art threat defenses like next-gen firewalls, microsegmentation and zero trust tools, but even the very best tools...

SASE: Securing the Network Edge

Dramatic growth in Internet of Things (IoT) devices and external users have forced IT departments to move storage and processing functions closer to the...