Cloud

ShiftLeft Raises $9.3 Million, Exits Stealth Mode

ShiftLeft, a Santa Clara, Calif application security startup emerged from stealth on Oct. 11 after securing $9.3 million in a Series A...

Secure AWS Now: PHM Medical Records, Accenture Data Exposed Online

Despite all the attention that unsecured Amazon S3 buckets have gotten lately as...

VIPRE Cloud Brings Machine Learning to Next-Generation Anti-Malware

Cybersecurity is becoming an immensely complex subject to master, leaving many security...

The Cloud Breach Epidemic: Verizon, Viacom the Latest to Leak Sensitive Data

Security researchers recently came across vast amount of data belonging to both...

Cloud Security Error Exposes Half a Million Voters’ Personal Information

Another day, another cloud leak: Kromtech researchers recently came across a misconfigured CouchDB database exposing information on 593,328 Alaskan voters."When the database...

Misconfigured Cloud Servers Expose Millions of Customer Records

In a pair of major data breaches disclosed over the past few...

How Amazon Solved The Biggest Cloud Security Threat

Time and again, one research outfit or another will "discover" a breach...

Qualys Expands Cloud and SSL/TLS Security Services

Qualys is adding new services to its Software-as-a-Service cloud platform, providing customers...

A Reminder of Cloud Security Best Practices: Millions of Verizon Customers’ Data Exposed

UpGuard researcher Chris Vickery recently found as many as 14 million Verizon customers' names, addresses, account details and account PINs in a...

Cisco Aims to Improve Cloud Security with Observable Networks Acquisition

Cisco already has a large portfolio of security technologies, but the networking giant is always looking to add even more capabilities.On July...

Latest articles

The IoT Cybersecurity Act of 2020: Implications for Devices

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in...

Top 10 Governance, Risk and Compliance (GRC) Vendors

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Data privacy...

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...