Security News

Security teams are in charge of their company's most important asset - data. Their mission is to make sure they discover and remediate all of the data-related risks and keep up with the frequent changes that can affect their sensitive data.

' It's a quotation which could easily be applied to the rapid growth of cloud application and service provision, and the accompanying threats to cyber security which have expanded in parallel. If this incurs a sense of anxiety, fear not! Once identified, any cyber threat can be prevented from causing too much damage.

Recent BigID research found that 86% of organizations use multiple cloud platforms to store their data- across IaaS, PaaS, and SaaS. As the reliance on cloud services continues to scale and malicious actors continue to evolve, it's critical to get a hold of your data wherever it exists in the cloud. In this Help Net Security video, Dimitri Sirota, CEO at BigID, discusses how companies are unprepared to deal with the unique challenges of securing data in the cloud.

Retiring: All cloud migration initiatives should begin with an IT portfolio audit to assess migration complexity, cost requirements, and security risks. Retaining: As an alternative to the retiring strategy, retaining involves keeping some applications on-premises or in a colocation as part of a hybrid cloud strategy.

With high chances of user error, limited security resources, and constantly evolving computing environments, commercial and public organizations need cybersecurity resources to help protect their data and workloads in the cloud. Download this white paper to learn what CIS resources can help secure your cloud environments.

For lean security teams, the more important question is how to make cloud security work, especially as the cloud footprint grows faster than security resources. It explains how security teams with less than 20, 10, or even 5 members can make cloud security work from here forward.

Webinar The cloud is constantly in flux, and with its continual growth comes an equally rapid acceleration of threats and vulnerabilities direct towards it. You could say the cloud environment resembles the wild west where even hired guns carefully guarding your wagon train are not always enough to prevent an ambush by a gang of determined outlaws.

Cloud computing was the lifeline that kept many companies running during the pandemic. But it was a classic case of medicine that comes with serious side effects. Having anywhere, anytime access...

VMware on Tuesday shipped security updates to address a critical security flaw in its VMware Cloud Foundation product. "Due to an unauthenticated endpoint that leverages XStream for input serialization in VMware Cloud Foundation, a malicious actor can get remote code execution in the context of 'root' on the appliance," the company said in an advisory.

VMware has released security updates today to fix a critical vulnerability in VMware Cloud Foundation, a hybrid cloud platform for running enterprise apps in private or public environments. The flaw is in the XStream open-source library used by Cloud Foundation and has an almost maximum CVSSv3 base score of 9.8/10 assigned by VMware.