Cloud

The latest security technology and best practices to secure cloud-based data, networks, applications, and systems.

  • Attackers Exploit Flaw that Could Impact Millions of Routers, IoT Devices

    Cybercriminals using an IP address in China are trying to exploit a vulnerability disclosed earlier this month to deploy a variant of the Mirai malware on network routers affected by the vulnerability, according to researchers with Juniper Threat Labs. In a recent blog post, the researchers said the bad actors are looking to leverage a… Read more


  • NSA, CISA Report Outlines Risks, Mitigations for Kubernetes

    Two of the largest government security agencies are laying out the key cyberthreats to Kubernetes, the popular platform for orchestrating and managing containers, and ways to harden the open-source tool against attacks. In a 52-page report released this week, the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) noted the advantages to… Read more


  • IoT Devices a Huge Risk to Enterprises

    When millions of people around the world were sent home to work at the onset of the global COVD-19 pandemic, they left behind not only empty offices but also a host of Internet of Things (IoT) devices – from smartwatches to networked printers – that were still connected to corporate networks and cranking away. According… Read more


  • Managed SIEM: A Faster Way to Great Security

    Staying on top of cybersecurity threats can be overwhelming, and finding security tools that can help can be a daunting task too. For some companies, turning over the problem to a managed security services provider (MSSP) is an attractive solution. Managed Security Information and Event Management (SIEM) systems are a good way to accomplish that.… Read more


  • The IoT Cybersecurity Act of 2020: Implications for Devices

    A universe of devices and technology has fallen into our laps at a speed that organizations struggle to manage effectively. And that boom in devices shows no signs of stopping. In 2019, there were an estimated 9.9 billion Internet of Things (IoT) devices. By 2025, we expect 21.5 billion. As more information about IoT device… Read more


  • How to Defend Common IT Security Vulnerabilities

    IT security pros have never faced more threats, whether it’s from the huge increase in remote work or aggressive nation-state sponsored hackers like those involved in the SolarWinds breach. While there will always be new holes to plug, security vulnerabilities usually stem from the same few causes: unpatched vulnerabilities, misconfigurations or user error, and even… Read more


  • Cloud-based security: SECaaS

    Irrespective of your organization’s size or complexity, a robust cybersecurity infrastructure is the key to protecting your network and data. But common problems prevail for IT staff monitoring or managing potential threats: a constant triage of alerts, dispersed information challenging to gather, and lack of time, tools, or resources to effectively protect your organization. To… Read more


  • Cloud Bucket Vulnerability Management

    The movement to the cloud means access to data anywhere, enhanced data recovery, flexibility for collaboration, and less of a burden on IT staff. But, while cloud providers boast that their storage services — or “buckets” — offer added application security, they have also consistently proven vulnerable. A bucket is a virtual storage unit provided… Read more


  • Remote Work Security: Priorities & Projects

    Each year, Gartner analysts recommend 10 security projects that combine high business impact with high risk reduction. Privileged access management (PAM) topped the list in 2018 and 2019. This year, after the COVID-19 pandemic forced nearly half of workers to telecommute, Gartner’s focus has now turned to securing the remote workforce. As if to underscore… Read more


  • Data Storage Security: Best Practices for Security Teams

    Data storage security involves protecting storage resources and the data stored on them – both on-premises and in external data centers and the cloud – from accidental or deliberate damage or destruction and from unauthorized users and uses. It’s an area that is of critical importance to enterprises because the majority of data breaches are… Read more


Top Cybersecurity Companies

Top 10 Cybersecurity Companies

See full list

Get the Free Newsletter!

Subscribe to Cybersecurity Insider for top news, trends & analysis