Cloud

Secure Access for Remote Workers: RDP, VPN & VDI

A fundamental cornerstone of security is layers. We use passwords to authenticate our users, run antivirus to keep malware off our endpoints, monitor our networks, and implement firewalls so we can ha...

IBM Moves Into EDR Market With ReaQta Acquisition

IBM is moving into the endpoint detection and response (EDR) market with the acquisition of ReaQta. IBM is positioning the announcement as part of its launch of an XDR product. Extended detection a...

Twitch Breach Shows the Difficulty of Cloud Security

Cloud security is a delicate balancing act of keeping the freedoms that make migration worthwhile while also keeping a company’s data secure. A recent breach of Twitch, an Amazon-owned company, showe...

EU to Force IoT, Wireless Device Makers to Improve Security

The European Union is poised to place more demands on manufacturers to design greater security into their wireless and Internet of Things (IoT) devices. In an amendment to the EU’s 2014 Radio Equip...

Illumio Unveils CloudSecure for Zero Trust Segmentation in the Cloud

Illumio today announced the launch of Illumio CloudSecure, an agentless solution designed to support zero trust security in public, hybrid, and multi-cloud environments. The new offering can be deploy...

CNAP Platforms: The Next Evolution of Cloud Security

Businesses have far more cloud security options than they once did, making clouds often as safe as, if not safer than, on-premises solutions. Still, cloud security has grown increasingly complicate...

How Machine Identities Can Imperil Enterprise Security

Managing machine identities has never been more critical to an enterprise's cybersecurity. Machine identities now outnumber humans in enterprises, according to Nathanael Coffing, co-founder and CSO...

Microsoft Azure Attack Illustrates Ongoing DDoS Threats

Officials with Microsoft’s Azure public cloud said the company in late August was able to stave off a record distributed denial-of-service (DDoS) attack against a European customer that originated in ...

Google Sending Security Keys to 10,000 Users at High Risk of Attack

Google is giving out 10,000 free security keys to high-risks users, an announcement that came a day after the company warned 14,000 of its high-profile users that they could be targeted by the notorio...

Attackers Exploit OMIGOD Flaw in Azure Despite Microsoft Fixes

Cybercriminals are targeting Linux-based servers running Microsoft’s Azure public cloud environment that are vulnerable to flaws after Microsoft didn't automatically apply a patch on affected clients ...

Latest articles

Top Cybersecurity Account...

AT&T Looks to Shut D...

Nation-State Attackers Us...

Fortinet vs Palo Alto Net...