And 10 they should have already done.
At the RSA Conference, AWS CISO Stephen Schmidt detailed best practices that can help reduce risk and improve cloud application resiliency.
IDC coins the term AIRO - Analytics, Intelligence, Response and Orchestration - to define an emerging area of cybersecurity.
Next-gen firewalls, UTMs, web application firewalls, cloud-based firewalls, container firewalls and more: Everything you need to know about firewalls.
2018 will bring more high-profile data breaches, with attacks and threats getting increasingly sophisticated. We outline 10 security trends to watch.
The information, from data analytics firm Alteryx, was in an Amazon S3 bucket configured to provide any AWS user with access.
The data is unusually sensitive, including full credit card and bank account numbers as well as images of Social Security cards and driver's licenses.
The exposed data includes information on the Army's Distributed Common Ground System and its cloud component, Red Disk.
Fortinet reports that 35 percent of organizations it monitored were attacked with the Apache Struts vulnerability in the third quarter of 2017.
Affected buckets are owned by major news sites, popular retailers and leading ad networks.
At DockerCon EU, Docker Security lead explains that what's needed to improve security is more safety.
VIDEO: Dino Dai Zovi, security researcher and CTO of Capsule8, details security concerns in container orchestration systems.