Glen Hymers, CISO and head of data protection at the U.K.-based charity Save the Children International, says adapting to a cloud-first environment requires extensive security measures, including automated monitoring.
Adopting a "security by design" approach and weaving it into the digital transformation road map helps organizations defend against cyberthreats, says Reem AlShammari, CISO at Kuwait Oil Co., who also advocates threat information sharing.
A recently uncovered vulnerability in a class of Amazon Web Service APIs can be exploited to leak AWS identity and access management user and arbitrary accounts, according to Palo Alto Networks' Unit 42.
European lawmakers are once again considering encryption policies and attempting to strike a balance between the privacy and security afforded by strong encryption and law enforcement's needs. But with encryption being a cornerstone of the internet, is there any new balance to be struck?
83% of organizations are looking for new monitoring approaches to handle today's cloud complexity. IT teams are challenged with monitoring cloud services and mission-critical applications by separate tools which lead to swivel chair approaches, runaway costs, and fragmented operational data getting trapped in siloed...
Attackers have been actively exploiting a flaw in Rackspace's hosted email service to send phishing emails, bearing legitimate and validated domain names, as part of business email compromise scams, warns IT security testing consultancy 7 Elements. Rackspace tells customers it plans to fix the problem soon.
As with any technology, cloud security vendors tout a wide range of attributes and features. It's often hard to distinguish between what's worth considering and what's simply noise. Here are 15 points to keep top-of-mind while evaluating solutions and determining the best fit for your organization.
This eBook, will help you discover the best ways to get started on implementing some of the many advantageous networking, web, data and cloud security, and connectivity solutions enabled by this powerful, emerging technology model.
Not only have enterprises accelerated their shift to the cloud in 2020, but they have also leapfrogged into multi-cloud environments. With this transition comes the top challenge: Maintaining appropriate visibility. Joe Partlow of ReliaQuest discusses how to tackle this challenge.
Cloud adoption is rapidly growing, and cloud-enabled organizations are experiencing an influx of new security requirements as a result. On top of these demands, they still need to protect their cloud applications and give users secure access to the cloud.
With the common framework a SASE provides, organizations...
As organizations adopt the cloud, new requirements for protecting and enabling mobile users are emerging. For years, the standard tool for mobile users was remote access VPN. In fact, for many people, "remote access" and "VPN" are synonymous.
However, with the number of applications and workloads moving to the...