Cloud

Cloud Security Failure: Millions of Wrestling Fans’ Personal Data Exposed

Kromtech security researchers recently came across two publicly accessible Amazon S3 buckets containing 3,065,805 World Wresting Entertainment (WWE) fans' names, email addresses,...

Qualys Expands Vulnerability Management and Container Security Capabilities

Cloud-delivered security services vendor Qualys is set to grow its solutions portfolio...

Sensitive Pentagon Files, Passwords Found on Amazon Server

The Department of Defense contractor Booz Allen Hamilton (BAH) recently placed more than 60,000 sensitive Pentagon files on a publicly accessible server,...

Cloud Security Best Practices for 2021

From the very beginning of the cloud computing era, security has been the...

Securing Docker, One Patch at a Time

Finding and fixing vulnerabilities is a good thing, according to Docker engineer Michael Crosby. In a standing-room only session at the DockerCon...

How Docker Swarm Uses Transparent Root Rotation to Improve Security

AUSTIN, Texas — There are multiple container orchestration systems in the market today, but according to Diogo Monica, security lead at Docker...

Latest articles

The IoT Cybersecurity Act of 2020: Implications for Devices

A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in...

Top 10 Governance, Risk and Compliance (GRC) Vendors

Governance, risk, and compliance (GRC) software helps businesses manage all of the necessary documentation and processes for ensuring maximum productivity and preparedness. Data privacy...

Best Intrusion Detection and Prevention Systems: Guide to IDPS

Intrusion Detection and Prevention Systems (IDPS) operate by monitoring network traffic, analyzing it and providing remediation tactics when malicious behavior is detected. They look...

Automating Security Risk Assessments for Better Protection

Protecting your organization from IT security risks is an ongoing, fluid task. Proactively identifying, mitigating and remediating security threats is one of the biggest...