Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Function-as-a-Service
Using confidential computing to protect Function-as-a-Service data

Organizations are embracing the power of Function-as-a-Service (FaaS). FaaS can be viewed as a very positive and beneficial result coming from years of data successfully …

AWS
AWS Snowcone: Ultra-portable, secure edge computing, storage, and data transfer device

Amazon Web Services announced AWS Snowcone, a new small, ultra-portable, rugged, and secure edge computing and data transfer device. At under 5 lbs and able to fit in a …

cloud
How to implement least privilege in the cloud

According to a recent survey of 241 industry experts conducted by the Cloud Security Alliance (CSA), misconfiguration of cloud resources is a leading cause of data breaches. …

Amazon AppFlow
Amazon AppFlow automates bidirectional data flows between AWS and SaaS apps

Amazon AppFlow is a fully managed service that provides an easy, secure way for customers to create and automate bidirectional data flows between AWS and SaaS applications …

BYOK
Multi-cloud key management and BYOK

Cloud providers such as Google Cloud Platform, AWS, and Microsoft Azure work hard to be the service provider of choice for enterprise customers. They often push the envelope …

Ping Identity PingID multi-factor authentication now available in AWS Marketplace

Ping Identity, the Intelligent Identity solution for the enterprise, announced the availability of PingID multi-factor authentication (MFA) in AWS Marketplace. Customers can …

Amazon Detective
Amazon Detective: Analyze and visualize security data to get to the root cause of security issues

Amazon Detective is a new security service that makes it easy for customers to conduct investigations into security issues across their AWS workloads. Identify the root cause …

cloud
Cloud misconfigurations surge, organizations need continuous controls

Nearly 33.4 billion records were exposed in breaches due to cloud misconfigurations in 2018 and 2019, amounting to nearly $5 trillion in costs to enterprises globally, …

NTT DATA Services enters strategic collaboration agreement with AWS

NTT DATA Services announced it has entered into a three-year, strategic collaboration agreement with Amazon Web Services, to deliver new products, services and solutions …

Dynatrace broadens its AI-powered software intelligence platform to support AWS hybrid clouds

Software intelligence company, Dynatrace, announced that it has extended its AI-powered software intelligence platform to support AWS hybrid clouds by providing seamless …

AWS
Control access and permissions to AWS services and resources

AWS IAM Access Analyzer is a new feature that makes it simple for security teams and administrators to check that their policies provide only the intended access to resources. …

network
Study on public cloud performance: AWS, GCP, Azure, Alibaba and IBM Cloud

There are notable network performance and connectivity differences between the five major public cloud providers – Amazon Web Services (AWS), Google Cloud Platform (GCP), …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools