Cloud

Explore the latest advancements in security technology and best practices designed to protect cloud-based data, networks, applications, and systems. Stay up to date with cutting-edge solutions for securing cloud infrastructures, ensuring data privacy, and safeguarding against cyber threats.

  • Cloud-based security: SECaaS

    Irrespective of your organization’s size or complexity, a robust cybersecurity infrastructure is the key to protecting your network and data. But common problems prevail for IT staff monitoring or managing potential threats: a constant triage of alerts, dispersed information challenging to gather, and lack of time, tools, or resources to effectively protect your organization. To…


  • Cloud Bucket Vulnerability Management

    The movement to the cloud means access to data anywhere, enhanced data recovery, flexibility for collaboration, and less of a burden on IT staff. But, while cloud providers boast that their storage services — or “buckets” — offer added application security, they have also consistently proven vulnerable. A bucket is a virtual storage unit provided…


  • Remote Work Security: Priorities & Projects

    Each year, Gartner analysts recommend 10 security projects that combine high business impact with high risk reduction. Privileged access management (PAM) topped the list in 2018 and 2019. This year, after the COVID-19 pandemic forced nearly half of workers to telecommute, Gartner’s focus has now turned to securing the remote workforce. As if to underscore…


  • Data Storage Security: Best Practices for Security Teams

    Data storage security involves protecting storage resources and the data stored on them – both on-premises and in external data centers and the cloud – from accidental or deliberate damage or destruction and from unauthorized users and uses. It’s an area that is of critical importance to enterprises because the majority of data breaches are…


  • What is Serverless Computing Security?

    Serverless computing is among the newest trends in cloud computing and also among the most complex. And as with any new technology, particularly a complicated one, serverless computing also brings with it new technology risks. With serverless computing, cloud computing is expressed at its most pristine level, without the need for organizations to run any…


  • How Netflix Secures AWS Cloud Credentials

    LAS VEGAS – Netflix has long been the poster child for being an “all-in-the-cloud” organization. The streaming media service relies on Amazon Web Services (AWS) for infrastructure and computing resources that it uses to operate. With AWS being a public cloud, resources can be shared and there are also multiple sets of credentials and access…



Get the free newsletter

Subscribe to Cybersecurity Insider for top news, trends & analysis

This field is required This field is required

Top Cybersecurity Companies