Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

group programmers team workers collaboration


Best practices for protecting AWS RDS and other cloud databases

The Relational Database Service from AWS can help streamline a host of cloud storage operations, but maintaining security requires some attention on the part of the user. Here are some best practices for using RDS.

Two developers / programmers collaborate as they review information on a display in their workspace.

SANS, Google launch academy to promote cloud security, diversity in workforce

To help tackle the skills deficit in cloud security, the SANS Institute and Google have launched a new academy focused on providing scholarship-based training for underrepresented groups.

corporate security insider threat hacker spy cybersecurity human resources

Akamai releases new threat hunting tool backed by Guardicore capabilities

Akamai Hunt combines the company’s historic DNS, WAF, and DDoS data with Guardicore’s segmentation and telemetry to detect and eliminate evasive threats.

keeping the cloud secure cloud security lock padlock private cloud

HPE to acquire Axis Security to deliver a unified SASE offering

HPE plans to expand its Aruba SASE platform with Axis Security’s Atmos, delivering a comprehensive edge-to-cloud, network and security solution as a service.

shutterstock 1748437547 cloud computing cloud architecture edge computing

Gitpod flaw shows cloud-based development environments need security assessments

The quickly fixed flaw could have allowed attackers to take over accounts in the CDE and perform remote code execution.


How automation in CSPM can improve cloud security

Automation capabilities in cloud security posture management platforms can speed the process of monitoring and remediating security and compliance risks.

cloud technology protection information cybersecurity indentity

Defending against attacks on Azure AD: Goodbye firewall, hello identity protection

Gone are the days when a good firewall was key to keeping attackers out of a network. Azure Active Directory users need to know the new weak spots in identity authentication and protection and how to mitigate attacks.

cloud hand touch create access secure clouds reach tech job certification

Cohesity Data Cloud 7.0 enhances privileged access authentication, ransomware recovery

Vendor announces the 7.0 software release of its Cohesity Data Cloud platform with a focus on “data-centric” cyber resilience.

Cloud security threats  >  theft / breach / fraud / phishing

Misconfiguration and vulnerabilities biggest risks in cloud security: Report

About 87% of container images include a high or critical vulnerability, while 90% of granted permissions are not used, according to cybersecurity firm Sysdig.

Patch + update options  >  Pixelized tools + refresh symbol with branching paths

9 API security tools on the frontlines of cybersecurity

Top API security tools can help hold the line against modern threats to the important and ubiquitous software development interfaces.

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

Skyhawk launches platform to provide threat detection and response across multi-cloud environments

Skyhawk says the Synthesis CDR platform employs machine learning aimed at eliminating alert fatigue with runtime protection of cloud infrastructure.

cloud security shield with checkmark / cloud / digital connections / cloud security expert / CASB

F5 expands security portfolio with App Infrastructure Protection

AIP goes one step further than API security and provides telemetry collection and intrusion detection for cloud-native workloads.

digital cloud security background concept picture id1331943958

Lacework adds new capabilities to its CSPM solution

The new capabilities will allow organizations to create custom policies for AWS, Google Cloud, and Azure to secure their cloud infrastructure.

10 cloud security breach virtualization wireless

Wiz debuts PEACH tenant isolation framework for cloud applications

The framework is designed to help address and secure cross-tenant vulnerabilities in multi-tenant cloud applications.

post 11 image foundational cloud security with cis benchmarks

Uptycs launches agentless cloud workload scanning

Double-barreled API- and agent-based scanning is now available from cloud security company Uptycs.

Data center / enterprise networking

Ransomware attack knocks Rackspace’s Exchange servers offline

Rackspace’s hosting for Exchange servers remained offline Tuesday after an outage Friday that the company now ascribes to a ransomware attack.

post 12 image three ways that security in the azure cloud just got simpler

Researchers found security pitfalls in IBM’s cloud infrastructure

A demonstrated attack by cybersecurity researchers in IBM’s cloud infrastructure allowed them access to the internal server used to build database images for customer deployments.

4 encryption keys

Fortanix unveils AWS integration for centralized key management

Multicloud users have a new option for encryption key management across platforms, with the news that Fortanix has now integrated AWS support.

Load More