Cloud

10 Best CASB Security Vendors for 2022

Any cloud-based infrastructure needs a robust cloud access security broker (CASB) solution to ensure data and application security and integrity.  With the adoption of cloud-based a...

Secure Access for Remote Workers: RDP, VPN & VDI

A fundamental cornerstone of security is layers. We use passwords to authenticate our users, run antivirus to keep malware off our endpoints, monitor our networks, and implement firewalls so we can ha...

IBM Moves Into EDR Market With ReaQta Acquisition

IBM is moving into the endpoint detection and response (EDR) market with the acquisition of ReaQta. IBM is positioning the announcement as part of its launch of an XDR product. Extended detection a...

Twitch Breach Shows the Difficulty of Cloud Security

Cloud security is a delicate balancing act of keeping the freedoms that make migration worthwhile while also keeping a company’s data secure. A recent breach of Twitch, an Amazon-owned company, showe...

EU to Force IoT, Wireless Device Makers to Improve Security

The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. In an amendment to the EU’s 2014 Radio Equip...

Illumio Unveils CloudSecure for Zero Trust Segmentation in the Cloud

Illumio today announced the launch of Illumio CloudSecure, an agentless solution designed to support zero trust security in public, hybrid, and multi-cloud environments. The new offering can be deploy...

CNAP Platforms: The Next Evolution of Cloud Security

Businesses have far more cloud security options than they once did, making clouds often as safe as, if not safer than, on-premises solutions. Still, cloud security has grown increasingly complicate...

How Machine Identities Can Imperil Enterprise Security

Managing machine identities has never been more critical to an enterprise's cybersecurity. Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO...

Microsoft Azure Attack Illustrates Ongoing DDoS Threats

Officials with Microsoft’s Azure public cloud said the company in late August was able to stave off a record distributed denial-of-service (DDoS) attack against a European customer that originated in ...

Google Sending Security Keys to 10,000 Users at High Risk of Attack

Google is giving out 10,000 free security keys to high-risks users, an announcement that came a day after the company warned 14,000 of its high-profile users that they could be targeted by the notorio...

Latest articles