The first steps of establishing your cloud security strategy
In this article, we’ll identify some first steps you can take to establish your cloud security strategy. We’ll do so...
Read more →In this article, we’ll identify some first steps you can take to establish your cloud security strategy. We’ll do so...
Read more →Cloud Console Cartographer is an open-source tool that maps noisy log activity into highly consolidated, succinct events to help security...
Read more →In this Help Net Security interview, Roy Davis, Manager – Vulnerability Management & Bug Bounty at Zoom, discusses the role...
Read more →Most compliance leaders tend to focus on building an ethical culture in their organizations to improve employee behavior, but it...
Read more →Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Palo Alto firewalls: Public exploits,...
Read more →More organizations hit by ransomware gangs are starting to realize that it doesn’t pay to pay up: “In Q1 2024,...
Read more →The CryptoChameleon phishing kit is being leveraged by vishing attackers looking to trick LastPass users into sharing their master password....
Read more →Here’s a look at the most interesting products from the past week, featuring releases from IDnow, Immuta, Privacera, Redgate, ShadowDragon,...
Read more →Protobom is an open-source software supply chain tool that enables all organizations, including system administrators and software development communities, to...
Read more →Threat actors are continuing to successfully breach across the entire attack surface and the stakes are only getting higher: 93%...
Read more →The newest version of Ivanti Avalanche – the company’s enterprise mobile device management (MDM) solution – carries fixes for 27...
Read more →Immuta launched Domains policy enforcement, a new capability in the Immuta Data Security Platform that provides additional controls for data...
Read more →