cloud security

Less than 20% of IT pros have complete access to critical data in public clouds
Companies have low visibility into their public cloud environments, and the tools and data supplied by cloud providers are insufficient. Lack of visibility can result in a …

Most IT and security professionals feel vulnerable to insider threats
91 percent of IT and security professionals feel vulnerable to insider threats, and 75 percent believe the biggest risks lie in cloud applications like popular file storage …

Cryptojacking of businesses’ cloud resources still going strong
In the past year or so, many cybercriminals have turned to cryptojacking as an easier and more low-key approach for “earning” money. While the value of …

Moving from traditional on-premise solutions to cloud-based security
In this Help Net Security podcast recorded at RSA Conference 2019, Gary Marsden, Senior Director, Data Protection Services at Gemalto, talks about the feedback they’re …

How cloud storage providers can preempt cyber attacks with business continuity
Cloud storage is now an integral part of almost every enterprise infrastructure and, as a result, security has become one of the most crucial elements of any cloud storage …

IT teams are struggling with network infrastructure challenges caused by the cloud
Public cloud adoption is growing by double-digit percentages year over year, and the public cloud market is expected to exceed $220 billion by the end of 2019, according to …

Cloud business initiatives accelerating faster than security teams’ ability to secure them
The speed of cloud business initiatives is hampering organizations’ ability to secure and manage hybrid environments, with security personnel often not included. The 2019 …

How are businesses facing the cybersecurity challenges of increasing cloud adoption?
Cloud services serve core functions essential to all aspects of business operations, but getting cloud security right is still a challenge for many organizations, the 2019 …

Microsoft rolls out new tools for enterprise security and compliance teams
Microsoft has announced a number of new capabilities and improvements for tools used by enterprise administrators. New Microsoft 365 security and compliance centers The new …

Vulnerable cloud infrastructure experiencing increasing attacks
Attackers are increasingly targeting vulnerable cloud infrastructure to exploit it for covert cryptojacking or to deliver ransomware, Securonix researchers warn. Some attacks …

Agents of disruption: Four testing topics argue the case for agentless security
Let me introduce myself. I’m a set of flaws in your otherwise perfect, agent-based security world. Like all disruptive agents, I derail your best-laid plans with expensive …

Beware the man in the cloud: How to protect against a new breed of cyberattack
One malicious tactic that has become quite prevalent in recent years is known as a ‘man in the cloud’ (MitC) attack. This attack aims to access victims’ accounts without the …
Featured news
Resources
Don't miss
- Critical CrushFTP vulnerability exploited. Have you been targeted? (CVE-2025-54309)
- How to land your first job in cybersecurity
- World Health Organization CISO on securing global health emergencies
- Calico: Open-source solution for Kubernetes networking, security, and observability
- Cyber turbulence ahead as airlines strap in for a security crisis