Can the public cloud become confidential?
It’s been often said that the only two certain things in life are death and taxes. Over the past ten years, it seems data breaches can be added to this list. Can an …
How to build a zero-trust cloud data architecture
Cloud computing has had a profound impact on CISOs. They realize its cheap storage, immense scalability, resource elasticity and accessibility from anywhere in the world, at …
Cybercriminals are manipulating reality to reshape the modern threat landscape
VMware released a report which analyzes how cybercriminals are manipulating reality to reshape the modern threat landscape. The report found a drastic rise in destructive …
Collaboration is key for cloud innovation
Developers and security professionals work in very different ways. While the former is likely to move and innovate fast – with quick coding and rapid application building a …
What is DataSecOps and why it matters
In this Help Net Security podcast, Ben Herzberg, Chief Scientist at Satori, explains what DataSecOps is, and illustrates its significance. Here’s a transcript of the podcast …
What should IT leaders look for in an SD-WAN solution?
The phrase “game-changing” has become almost overused in recent years, particularly in the world of tech. To an extent, this reflects the degree of constant innovation taking …
Cloud and security are top priorities for MSPs
Datto announced the release of the fifth annual Global State of the MSP Report. Based on an independent survey of more than 1,800 MSPs worldwide, the report reflects how MSPs …
Competition main force behind increased cloud migration
Organizations are moving to the cloud in big numbers to drive competitive strategies and provide richer customer experiences, according to Next Pathway. This is a shift from …
Exposing the latest cloud threats affecting enterprises
Netskope revealed new research showing the continued growth of malware delivered by cloud applications and also the potential for critical data exfiltration tied to employees …
36% of organizations suffered a serious cloud security data leak or a breach in the past year
As cloud adoption accelerates and the scale of cloud environments grows, engineering and security teams say that risks—and the costs of addressing them—are increasing. The …
IoT malware attacks rose 700% during the pandemic
Zscaler released a study examining the state of IoT devices left on corporate networks during a time when businesses were forced to move to a remote working environment. The …
Outsourcing cloud management driven by increasingly complex IT environments
Enterprises across the globe are turning to cloud outsourcing providers to manage their private and hybrid cloud infrastructure because of increasingly complex IT …
Featured news
Resources
Don't miss
- PureLogs infostealer is stealing credentials worldwide
- Earbud sensors can authenticate users by their heartbeat, study finds
- AI is drowning software maintainers in junk security reports
- Attackers are exploiting critical NGINX vulnerability (CVE-2026-42945)
- Attackers accessed, downloaded code from Grafana Labs’ GitHub