Home Security Cloud Security

Cloud Security

Managing Security Risks in the Cloud

Often, I find that only a handful of organizations have a complete understanding of where they stand in today’s threat landscape. That's...

Anatomy of a Cloud-Native Data Breach

Migrating computing resources to cloud environments opens up new attack surfaces previously unknown in the world of premise-based data centers. As a...

Security Pros and Perils of Serverless Architecture

Serverless architectures are revolutionizing the way organizations procure and use enterprise technology. This cloud computing model can drive cost-efficiencies, increase agility and enable organizations...

Are Your DevOps Your Biggest Security Risks?

We have all heard the horror tales: a negligent (or uniformed) developer inadvertently exposes AWS API keys online, only for hackers to find those...

Mitigating Cloud Attacks With Configuration Hardening

For attackers, misconfigurations in the public cloud can be exploited for a number of reasons. Typical attack scenarios include several kill chain steps, such as...

Excessive Permissions are Your #1 Cloud Threat

Migrating workloads to public cloud environment opens up organizations to a slate of new, cloud-native attack vectors which did not exist in the world...

Ensuring Data Privacy in Public Clouds

Most enterprises spread data and applications across multiple cloud providers, typically referred to as a multicloud approach. While it is in the best interest of public...

Now or Never: Financial Services and the Cloud

I will get straight to the point: The time is right for the financial services (FS) industry to leverage the power of the cloud....

2019 Predictions: Will Cyber Serenity Soon Be a Thing of the Past?

In 2018 the threat landscape evolved at a breakneck pace, from predominantly DDoS and ransom attacks (in 2016 and 2017, respectively), to automated attacks....

Evolving Cyberthreats: Enhance Your IT Security Mechanisms

For years, cybersecurity professionals across the globe have been highly alarmed by threats appearing in the form of malware, including Trojans, viruses, worms, and...

Embarking on a Cloud Journey: Expect More from Your Load Balancer

Many enterprises are in transition to the cloud, either building their own private cloud, managing a hybrid environment – both physical and virtualized—or deploying...

Using Application Analytics to Achieve Security at Scale

Are you overwhelmed by the number of security events per day? If so, you are not alone. Alert Fatigue is Leaving You Exposed It is not...

Must Read

Application Security in the Microservices Era

As organizations break their applications down into microservices, the responsibility for securing these environments is shifting as well.

The State-Sponsored Cyberthreat Landscape

State-sponsored cyberattacks have emerged as one of the preeminent threats targeting companies today.

The Evolution of Application Development

Delivering and securing containers and microservices is relatively new. Though there may be a few hiccups, all will normalize to a strong, steady state.

Agile Security Is Now A Reality

Businesses are looking to optimize and accelerate their SDLC, in order to improve their operational efficiency and gain a competitive edge.

Nation-State Attacks: Motivations & Consequences

Organizations leave sensitive, monetizable data unprotected, making cyberattacks a high-stakes, low-risk venture for nation-states.