Cloud

Top 12 Cloud Security Best Practices for 2022

From the very beginning of the cloud computing era, security has been the biggest concern among enterprises considering the public cloud. For many organizations, the idea of storing data or running a...

AWS Unveils Cloud Security Competency Program for MSSPs

Amazon Web Services has unveiled a revamped competency for managed security service providers (MSSPs) that is intended to make it simpler for end customers to identify AWS partners that have the most ...

An Investment Firm Built Its Own SIEM. Here’s How.

SIEM solutions can be expensive and difficult to manage, so one company built its own - and is pleased with the results. At last week's Black Hat USA, NYC-based financial technology firm Two Sigma...

Attackers Exploit Flaw that Could Impact Millions of Routers, IoT Devices

Cybercriminals using an IP address in China are trying to exploit a vulnerability disclosed earlier this month to deploy a variant of the Mirai malware on network routers affected by the vulnerability...

NSA, CISA Report Outlines Risks, Mitigations for Kubernetes

Two of the largest government security agencies are laying out the key cyberthreats to Kubernetes, the popular platform for orchestrating and managing containers, and ways to harden the open-source to...

IoT Devices a Huge Risk to Enterprises

When millions of people around the world were sent home to work at the onset of the global COVD-19 pandemic, they left behind not only empty offices but also a host of Internet of Things (IoT) devices...

Top Cloud Security Companies & Tools for 2022

Cloud computing has become ubiquitous because of its agility and cost savings — but along with those benefits have come security concerns. Because cloud is a different way of delivering IT resources, ...

Managed SIEM: A Faster Way to Great Security

Staying on top of cybersecurity threats can be overwhelming, and finding security tools that can help can be a daunting task too. For some companies, turning over the problem to a managed security ser...

The IoT Cybersecurity Act of 2020: Implications for Devices

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in devices shows no signs of stopping. In 2019, there were an ...

How to Defend Common IT Security Vulnerabilities

IT security pros have never faced more threats, whether it's from the huge increase in remote work or aggressive nation-state sponsored hackers like those involved in the SolarWinds breach. While ther...

Latest articles