Cloud

The IoT Cybersecurity Act of 2020: Implications for Devices

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in devices shows no signs of stopping. In 2019, there were an ...

How to Defend Common IT Security Vulnerabilities

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those involved in the SolarWinds breach. While ther...

Cloud-based security: SECaaS

Irrespective of your organization's size or complexity, a robust cybersecurity infrastructure is the key to protecting your network and data. But common problems prevail for IT staff monitoring or man...

Cloud Bucket Vulnerability Management in 2021

The movement to the cloud means access to data anywhere, enhanced data recovery, flexibility for collaboration, and less of a burden on IT staff. But, while cloud providers boast that their storage se...

Firewalls as a Service (FWaaS): The Future of Network Firewalls?

Does your organization still have a physical appliance for a firewall? You might be able to count the days before that black box is gone. Advancements in cloud solutions have brought a suite of securi...

Remote Work Security: Priorities & Projects

Each year, Gartner analysts recommend 10 security projects that combine high business impact with high risk reduction. Privileged access management (PAM) topped the list in 2018 and 20...

Cloud Security Requires Visibility, Access Control: Security Research

Cloud computing has been one of the most ubiquitous trends in modern IT, bringing with it a host of new opportunities and challenges. And cloud security has been fertile ground for s...

Data Storage Security: Best Practices for Security Teams

Data storage security involves protecting storage resources and the data stored on them – both on-premises and in external data centers and the cloud – from accidental or del...

What is Serverless Computing Security?

Serverless computing is among the newest trends in cloud computing and also among the most complex. And as with any new technology, particularly a complicated one, serverless computing...

How Netflix Secures AWS Cloud Credentials

LAS VEGAS - Netflix has long been the poster child for being an "all-in-the-cloud" organization. The streaming media service relies on Amazon Web Services (AWS) for infrast...

Latest articles