We outline the key threats to data storage security, best practices for stopping those threats, and data storage security compliance considerations.
Serverless is a new computing paradigm that also introduces new security risks. Learn what serverless is and the security steps your organization needs to take to make serverless workloads run securely.
Our 2019 IT security predictions: Encryption will lose its luster, cloudjacking and containers will be growing risks, and more.
And 10 they should have already done.
At the RSA Conference, AWS CISO Stephen Schmidt detailed best practices that can help reduce risk and improve cloud application resiliency.
IDC coins the term AIRO - Analytics, Intelligence, Response and Orchestration - to define an emerging area of cybersecurity.
Next-gen firewalls, UTMs, web application firewalls, cloud-based firewalls, container firewalls and more: Everything you need to know about firewalls.
2018 will bring more high-profile data breaches, with attacks and threats getting increasingly sophisticated. We outline 10 security trends to watch.
The information, from data analytics firm Alteryx, was in an Amazon S3 bucket configured to provide any AWS user with access.
The data is unusually sensitive, including full credit card and bank account numbers as well as images of Social Security cards and driver's licenses.
The exposed data includes information on the Army's Distributed Common Ground System and its cloud component, Red Disk.
Fortinet reports that 35 percent of organizations it monitored were attacked with the Apache Struts vulnerability in the third quarter of 2017.