newsAmazon’s AWS Control Tower aims to help secure your data’s bordersAs digital compliance tasks and data sovereignty rules get ever more complicated, Amazon wants automation to help.By Jon Gold28 Nov 20233 minsRegulationCloud Security news Cohesity taps Amazon for generative AI, cloud-based securityBy Jon Gold13 Nov 20233 minsGenerative AICloud SecurityData and Information Securityfeature Keep it secret, keep it safe: the essential role of cybersecurity in document managementBy Linda Rosencrance08 Nov 20238 minsCSO and CISOCloud SecurityData and Information Security newsMost cloud moves found rushed as adopters underrate associated risks: ReportBy Shweta Sharma 06 Nov 20234 minsCloud Security brandpostSponsored by SysdigA blueprint for high-speed cloud-native security 06 Nov 20234 minsCloud Security featureHow to choose the best cloud security posture management toolsBy Linda Rosencrance 30 Oct 20238 minsThreat and Vulnerability ManagementThreat and Vulnerability ManagementThreat and Vulnerability Management brandpostSponsored by Palo Alto NetworksCrucial insights for executives on CNAPPBy Zachary Malone, SE Academy Manager, Palo Alto Networks 24 Oct 20235 minsCloud Security newsLacework adds multiple extensions to its multicloud security platformBy Shweta Sharma 24 Oct 20233 minsCloud Security newsPalo Alto Networks updates Prisma Cloud with integrated cloud securityBy Shweta Sharma 19 Oct 20233 minsCloud Security ArticlesfeatureHow API authentication vulnerabilities are at the center of cloud security concernsMicrosoft’s cloud services have come under scrutiny in recent months, with APIs at the heart of the matter. Here are some strategies to help mitigate security issues that can arise when using APIs.By Susan Bradley 23 Aug 2023 6 minsAuthenticationCloud SecurityAPIsnewsMongoDB rolls out Queryable Encryption to secure sensitive data workflowsTechnology reduces risks of data exposure and can be used with AWS Key Management Service, Microsoft Azure Key Vault, and Google Cloud Key Management Service.By Michael Hill 15 Aug 2023 4 minsEncryptionCloud SecurityData and Information Securitynews analysisMultiple data center vulnerabilities could cripple cloud servicesVulnerabilities affect data center services commonly used by organizations and could be exploited by attackers to gain system access and perform remote code execution.By Michael Hill 12 Aug 2023 6 minsCloud SecurityVulnerabilitiesnewsGoogle Cloud launches Chronicle CyberShield to help government agencies tackle threatsThe solution enables governments to build cybersecurity skills and capabilities and facilitate knowledge sharing and collaboration.By Michael Hill 10 Aug 2023 4 minsGovernmentSecurity Operations CenterCloud SecuritynewsNew runtime security tool scans ongoing attacks in cloud workloadsSweet is a runtime security software that uses eBPF technology to scan and respond to runtime anomalies in cloud environments.By Shweta Sharma 10 Aug 2023 3 minsCloud SecuritySecurity Softwarenews analysisAttackers use Cloudflare Tunnel to proxy into victim networksExploiting Cloudflare Tunnel requires little skill and potentially could compromise and entire network.By Lucian Constantin 08 Aug 2023 6 minsCyberattacksCloud SecurityNetwork SecuritynewsKubernetes clusters under attack in hundreds of organizationsMalware and backdoors used in attacks affecting some Fortune 500 companies.By Michael Hill 08 Aug 2023 5 minsCloud SecurityNetwork SecurityOpen SourcenewsVectra AI unveils XDR platform with real-time attack signal intelligenceXDR platform uses native and third-party attack signals across hybrid cloud domains including AWS, Microsoft Azure, and Google Cloud as well as networks and endpoints.By Michael Hill 08 Aug 2023 4 minsThreat and Vulnerability ManagementCloud SecurityNetwork Securitynews analysisBeware of overly permissive Azure AD cross-tenant synchronization policiesA new proof of concept shows that attackers can use Azure AD CTS to leap to Microsoft and non-Microsoft application across tenants.By Lucian Constantin 02 Aug 2023 6 minsActive DirectoryAzure FunctionsCloud SecuritynewsIn new ransomware model, cloud provider acts as front for bad actors: reportA new report from anti-ransomware vendor Halcyon said that virtual private server provider Cloudzy is being used to host malicious activity from numerous sources.By Jon Gold 01 Aug 2023 3 minsRansomwareCloud SecuritynewsNew access management tool to focus on the least privileges ConductorOne’s cloud-based privileged access management product will allow security teams to grant just-in-time access to privileged resources.By Shweta Sharma 28 Jul 2023 3 minsCloud SecurityIdentity and Access ManagementnewsPalo Alto Networks adds new CI/CD security module to Prisma CloudNew module addresses security challenges of modern engineering ecosystems with capabilities spanning visibility, control, risk management, and breach detection.By Michael Hill 27 Jul 2023 5 minsCloud SecurityRisk Management Show more Show less View all Resources whitepaper Data Protection in a Multicloud World Data protection challenges resulting in disruption are on the rise with public clouds and cyberattacks the leading areas of concern. Organizations that continue to modernize data protection can minimize risk and raise confidence levels The post Data Protection in a Multicloud World appeared first on Whitepaper Repository. By Dell Technologies 18 May 2023Cloud SecurityData and Information SecurityMulti Cloud whitepaper The Long Road Ahead to Ransomware Preparedness By Dell Technologies 17 May 2023Cloud SecurityRansomwareSecurity View all Video on demand videoHoneypots and the evolution of botnets | Salted Hash Ep 23Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm’s recent honeypot research, which gathered information showing how the bot landscape is evolving. 20 Apr 2018 12 minsAdvanced Persistent ThreatsFirewallsBackup and Recovery DJI's bounty problems and video surveillance programs | Salted Hash Ep 13 08 Jan 2018 21 minsData BreachHackingApplication Security Zero Trust networks and enterprise security strategy | Salted Hash Ep 12 18 Dec 2017 26 minsCloud SecurityCloud ComputingSecurity The latest on Azure Stack, cyberattacks, the next iPhone and ... keyboards 20 Jul 2017 41 minsAppleMicrosoftSmartphones See all videos Explore a topic Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news Top cybersecurity product news of the week By CSO staff 30 Nov 202317 mins Generative AIGenerative AIMachine Learning feature How to maintain a solid cybersecurity posture during a natural disaster By James Careless 30 Nov 20238 mins Security Operations CenterData and Information SecuritySecurity Practices news analysis Attackers could abuse Google's SSO integration with Windows for lateral movement By Lucian Constantin 30 Nov 20238 mins Multi-factor AuthenticationSingle Sign-onRemote Access Security podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University 16 Oct 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape 10 Oct 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison 20 Nov 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication 06 Nov 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome 16 Oct 202315 mins CSO and CISO