Security News

It’s time to fill those cloud security gaps
2022-12-22 12:58

According to analysis by cloud security startup Wiz and EY, 93 percent of cloud environments were vulnerable to the Log4Shell vulnerability. It's a challenge that existing tools struggle with, argues Wiz product vice president Yinon Costica, who points out that these have been adapted ad-hoc from an established computing model not built with cloud security in mind.

Dealing with cloud security shortfalls
2022-12-22 04:00

"Several years ago in cybersecurity, companies realized that the single greatest threat vector was the individual end user. So, the focus shifted from perimeter and end-point security to automatically applying security at the user level," said Jeff Kukowski, CEO of CloudBolt. "I think this new report reveals a similar parallel in cloud security. Macro solutions that don't make cloud security automatic at the individual, cloud-provisioning 'moment of truth' create lots of opportunity for exposure and leave enterprises only 'somewhat, sometimes' secure. I predict 2023 will be the year we see significantly more focus on shoring up these current cloud security shortfalls. It's a very solvable problem when you apply the right approaches," Kukowski continued.

On-premises vs cloud security: What are the pros and cons?
2022-12-20 21:01

Security benefits of on-premises networks Monitoring and on-site staff mitigate security risks. "On-premises security deals with deploying tools that require all network traffic to be routed via the physical security appliances residing on the network premises, so it can be monitored and analyzed to mitigate security risks," Thangaraj said.

Cloud security starts with zero trust
2022-11-28 06:00

In this interview for Help Net Security, Mark Ruchie, CISO at Entrust, talks about cloud security and how zero trust should be implemented to guarantee overall cloud protection. Generally speaking, the best way for an organization to approach zero trust is for security teams to take the mindset that the network is already compromised and develop security protocols from there.

Cloud Security Comparison Guide
2022-11-10 00:00

You will also receive a complimentary subscription to TechRepublic's News and Special Offers newsletter and the Top Story of the Day newsletter. You may unsubscribe from these newsletters at any time.

Whitepaper: Shared responsibility model for cloud security
2022-11-02 04:00

With high chances of user error, limited security resources, and constantly evolving computing environments, commercial and public organizations need cybersecurity resources to help protect their data and workloads in the cloud. Download this white paper to learn what CIS resources can help secure your cloud environments.

Cloud Security Made Simple in New Guidebook For Lean Teams
2022-10-28 13:25

For lean security teams, the more important question is how to make cloud security work, especially as the cloud footprint grows faster than security resources. It explains how security teams with less than 20, 10, or even 5 members can make cloud security work from here forward.

Cloud security made simple in new guidebook for lean teams
2022-10-27 02:50

Cloud computing was the lifeline that kept many companies running during the pandemic. But it was a classic case of medicine that comes with serious side effects. Having anywhere, anytime access...

Microsoft tries again to ignite interest in DevOps cloud security
2022-10-12 16:30

Microsoft is rolling out its usual host of cloud security features and services at this week's Ignite 2022 conference, with the focus on what's happening in and outside the firewall. Protecting against sensitive information being shared by teams is also a theme, according to the show briefing, although some of the newly-announced security features have been previewed with Redmond Microsoft 365 E5 license users.

Top 5 best practices for cloud security
2022-10-06 16:31

Cloud security plays a key role in this transition and journey to cloud, and it involves examining an organization's data processing and storage practices to outline unique strategies for protecting data. Using the best cloud security practices is essential for any organization because of the severe reputational consequences of not doing so.