Please turn on your JavaScript for this page to function normally.
cloud
Five critical cloud security challenges and how to overcome them

Today’s organizations desire the accessibility and flexibility of the cloud, yet these benefits ultimately mean little if you’re not operating securely. One …

cloud
Most security pros are concerned about human error exposing cloud data

A number of organizations face shortcomings in monitoring and securing their cloud environments, according to a Tripwire survey of 310 security professionals. 76% of security …

face
Maximizing data privacy: Making sensitive data secure by default

Maximizing data privacy should be on every organization’s priority list. We all know how important it is to keep data and applications secure, but what happens when …

cloud
Misconfigured cloud storage services are commonplace in 93% of deployments

Cloud breaches will likely increase in velocity and scale, and highlights steps that can be taken to mitigate them, according to Accurics. “While the adoption of cloud native …

lock
Delivering and maintaining security at the speed of digital transformation

Dustin Rigg Hillard, CTO at eSentire, is responsible for leading product development and technology innovation. His vision is rooted in simplifying and accelerating the …

Attackers exploit Twilio’s misconfigured cloud storage, inject malicious code into SDK

Twilio has confirmed that, for 8 or so hours on July 19, a malicious version of their TaskRouter JS SDK was being served from one of their AWS S3 buckets. “Due to a …

cloud
70% of organizations experienced a public cloud security incident in the last year

70% of organizations experienced a public cloud security incident in the last year – including ransomware and other malware (50%), exposed data (29%), compromised accounts …

encryption
Data security matters more than ever in the new normal

Even before lockdowns, there was a steady migration toward more flexible workforce arrangements. Given the new normal of so many more people working from home—on top of a pile …

remote work
With remote working on the rise, infosec strategies need to evolve

The recent pandemic created a new normal that redefines the way business operates by eliminating security and physical work borders. An Avertium study found that having …

puzzle
Why identity-based, distributed controls are better suited to address cloud-era threats

With more and more IT resources moving to the cloud and remote work becoming a ubiquitous business practice due to COVID-19, perimeter-based security is undeniably becoming a …

healthcare
Privacy and security concerns related to patient data in the cloud

The Cloud Security Alliance has released a report examining privacy and security of patient data in the cloud. In the wake of COVID-19, health delivery organizations (HDOs) …

Microsoft OneDrive
5 keys to protecting OneDrive users

With the dramatic shift toward remote workforces over the last three months, many organizations are relying more heavily on cloud tools and application suites. One of the most …

Don't miss

Cybersecurity news