Cloud Security Trends, Best Practices Everyone Should Know
Cloud Security , Security Operations , Video Experts to Host a Deep Dive into Cloud Security at ISMG Engage Chicago Tom Field (SecurityEditor) • June 9, 2023 Ben Nicholson, globalRead more
Cloud Security , Security Operations , Video Experts to Host a Deep Dive into Cloud Security at ISMG Engage Chicago Tom Field (SecurityEditor) • June 9, 2023 Ben Nicholson, globalRead more
BleepingComputer reports that Honda had its e-commerce platform for power equipment impacted by password reset API security vulnerabilities, which could be leveraged to access customer information and other documents. Information exposed through the exploitation of the flaws, identified by securityRead more
So you’re headed to AWS re:Inforce? Say no more–we’ve got what you need. The cloud has revolutionized the way businesses operate, enabling them to scale, innovate, and stay agile in an increasingly digital world. However, with thisRead more
Deepwatch announced a global strategic partnership with Lacework to offer organizations comprehensive and proactive security solutions. This strategic partnership combines Deepwatch’s MDR expertise with Lacework’s advanced cloud security analytics, providing enterprises with an unmatched level of protection against modernRead more
Here’s a look at the most interesting products from the past week, featuring releases from 1Password, Datadog, Enveedo, Lacework, and NinjaOne. Lacework simplifies cloud security with risk calculation on users’ permissions Lacework announced new CIEM functionality to addressRead more
This comprehensive suite of capabilities, coupled with Elastic Security’s power to customize and integrate, solidifies its position as a critical tool in your cloud security arsenal. With such a dynamic platform, your cloud security strategy is not only about defenseRead more
Cloud Service Providers (CSPs) offer various computing services, which process large amounts of data that often are critical for business operations. Therefore, maintaining comprehensive visibility into the runtime of these workloads is not just desirable; it’s absolutely essential. This visibilityRead more
The digital world is expanding at an unprecedented rate, and with it comes the need for businesses to think carefully about security. With so many organizations now opting to store their sensitive data in cloud networks, safeguarding that informationRead more
Amazon Web Services (AWS) successfully completed a special onboarding audit with no findings for ISO 9001, 27001, 27017, 27018, 27701, and 22301, and Cloud Security Alliance (CSA) STAR CCM v4.0. Ernst and Young Certify Point auditors conducted the audit andRead more
To thrive in today’s fast-paced and ever-changing business landscape, many organizations rely on Amazon Web Services (AWS) for its agility and scalability. AWS allows companies to rapidly deploy and scale technology to meet fluctuating demands without heavy investments in ITRead more
A report on The Future of Cloud Security in the Middle East highlights the importance of sovereign cloud, hybrid cloud, and talent as key challenges and trends facing organisations in the region. The report was launched by today byRead more
What Is Cloud Security Monitoring? Monitoring virtual & physical servers for potential threats or security loopholes is termed as cloud security monitoring. It helps identify these issues and rapidly respond to them, keeping your network safe. Cloud security monitoring bestRead more
Sysdig, a cloud security platform powered by runtime insights, announces end-to-end detection and response embedded in its CNAPP. Read more
AI has been the subject of a lot of hype in recent months, but one place where the hype is justified is cybersecurity. AI will completely remake the cybersecurity landscape — and create a lot of disruption in the process.Read more
IT security buyers are consolidating vendors at an overwhelming rate, according to a speaker at this week’s Gartner Security & Risk Management Summit. In a session on cybersecurity market trends and growth opportunities, Gartner analyst and VP Neil MacDonald saidRead more
A survey of global cybersecurity leaders through the 2023 Certified CISO Hall of Fame Report commissioned by EC-Council identified 4 primary areas of grave concern: cloud security, data security, security governance, and lack of cybersecurity talent. Read more
Ensuring robust cloud security is a top priority for organizations navigating the ever-evolving digital landscape. We proudly announce that Orca Security, a cloud security solutions leader, has achieved CSA STAR (Level 1) compliance. This significant milestone demonstrates our commitmentRead more
Cloud security firm Sysdig has embedded cloud detection and response (CDR) into its cloud-native application protection platform (CNAPP). The company claims to be the first vendor to offer this consolidation, a move that enables its CNAPP to detect threats withRead more
CrowdStrike has unveiled new cloud security capabilities to deliver complete visibility into potential attack paths, from endpoint to cloud, and instantly secure vulnerable cloud workloads across build and runtime. As part of this, CrowdStrike announced a “1-Click XDR” capabilityRead more
Security pros often have a thankless job. CISOs rarely get praise when cybersecurity programs run smoothly. But as soon as a data breach occurs, it’s the security team that’s held accountable. And that’s why many security leaders prohibit or heavilyRead more
Cisco this week took the wraps off a security service edge (SSE) offering that aims to help enterprises securely connect growing edge resources, including cloud, private and SAAS applications. Along with the SSE package, the vendor madeRead more
Application Security , Artificial Intelligence & Machine Learning , Next-Generation Technologies & Secure Development EVP & GM Jeetu Patel on Simplifying Secure Access, Private Cloud Security Controls Michael Novinson (MichaelNovinson) • June 6, 2023 Read more
A security information and event management (SIEM) system is about as complicated as a security tool can get, pulling in log and threat data from a wide range of sources to look for signs of a cyber attack. Not surprisingly,Read more
Lacework announced new CIEM functionality to address the complex and growing challenges in managing identity threats and unnecessary risk within public cloud environments. With over 35,000 granular permissions across hyperscale cloud providers, organizations can struggle to maintain an overview andRead more
Analysts and experts praised Microsoft Fabric as a significant advancement that could help Microsoft leapfrog Amazon and other cloud providersRead MoreRead more
Cloud computing security risks are a shared responsibility of both the cloud service provider (CSP) and the organization using the services. It is crucial to assess this from the very beginning to understand the complex topic of cloud security we`reRead more
At Tenable, we believe that you need exposure management to protect your modern attack surface. But it’s not just us. We feel the Gartner “Predicts 2023: Enterprises Must Expand from Threat to Exposure Management” report is required reading for cybersecurity teams adopting an exposure management program and platform. At Tenable, we see this scenario every …
Want to Learn More about Exposure Management? Check Out This Gartner® Report Read More »
Cloud security provider Lacework has released a new cloud infrastructure entitlement management (CIEM) offering to strengthen the observability of all cloud identities. The new capability is aimed at simplifying Lacework’s cloud security offering by merging with its existing cloud security postureRead more