Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.
abstract internet network cyber security concept picture id1072278762

cloud security expert casb binary cloud computing cloud security by metamorworks getty

Key takeaways from CSA’s SaaS Governance Best Practices guide

Security and governance policies and practices are failing to keep up with the growth of SaaS usage. The Cloud Security Alliance's guidance aims to get that back on track.

Google Cloud

Google Cloud gets new built-in security features

MITRE ATT&CK integration and baked-in DDoS prevention are now available in Google Cloud.

10 cloud security breach virtualization wireless

Palo Alto adds out-of-band web application security features to Prisma Cloud

Vendor says new updates will help organizations better monitor and secure web applications without impacting performance.

Computerworld > Microsoft OneDrive / Microsoft SharePoint

Ransomware could target OneDrive and SharePoint files by abusing versioning configurations

A proof-of-concept exploit could make Office 365 or Microsoft 365 documents stored on OneDrive or SharePoint inaccessible.

Tech Spotlight   >   Cloud [CSO]   >   Conceptual image of laptop users with cloud security overlay.

RSA: Cisco launches SASE, offers roadmap for other cloud-based services

New Cisco services aim to simplify security operations with new as-a-service offerings.

modern server room with server racks in data center picture id1186291565

HYAS brings security threat detection, response to production networks

HYAS Confront uses domain expertise and proprietary machine learning to monitor and detect anomalies in production network environments and improve visibility as applications move to the cloud.

cloud security / data protection / encryption / security transition

Deepfence Cloud builds on ThreatStryker security observability platform

The SaaS version of ThreatStryker will build on its real-time observation and protection abilities, spanning multiple cloud and development instances.

Intel

Intel bets big on security as a service for confidential computing

At its inaugural Vision event, Intel launched a security as a service initiative called Project Amber for confidential computing in the cloud, and outlined its support for secure and responsible AI and quantum-resistant cryptography....

programmer certification skills code devops glasses student by kevin unsplash

Progress launches Chef Cloud Security to extend DevSecOps to cloud-native assets

The software provider has also enhanced its underlying security and compliance mechanism Chef InSpec with new features.

Cloud Security

Wrongly configured Google Cloud API potentially creates dangerous functionality

Misconfiguration of the Google Cloud Platform API could create an exploitable behavior that leads to service compromise.

abstract face / digital identity

Firms struggling with non-person identities in the cloud

Enterprises turning to cloud identity governance, cloud infrastructure entitlements management. and AI-driven investigation, behavioral detection programs to treat cloud security ailments.

clothes pins cleaning laundry clean hygiene housekeeping by felix prado via unsplash 2400x1600

The cloud security emperor has no pants

“Shared responsibility” usually means that no one is responsible for minding the gap. Don’t fall in.

sdn software defined network architecture

New SDP 2.0 specification facilitates zero-trust maturity

The Cloud Security Alliance's Software-Defined Perimeter 2.0 specification creates a path to a zero-trust approach through strong access controls.

cloud security / data protection / encryption / security transition

Verica launches Prowler Pro solution to enhance AWS security

Verification vendor Verica and Prowler creator say enterprise-grade solution provides enhanced cloud security and new open-source tools.

A network of connected virtual container blocks.

Managing container vulnerability risks: Tools and best practices

The sooner you can identify vulnerabilities in containers, the better, and this advice on practices and tools can help.

API security alert / software development / application flow chart diagram

Qualys Multi-Vector EDR update prioritizes alert response

The latest version of the Qualys Multi-Vector EDR tool includes additional threat-hunting and risk mitigation capabilities, improving alert prioritization and reducing the time needed to respond to threats.

A magnifying lens examines top secret information amid binary code.

Keeping secrets in a devsecops cloud-native world

Good secrets management practices can help identify and mitigate the risk to credentials, access keys, certificates and other sensitive data.

cloud security / data protection / encryption / security transition

Palo Alto launches cloud-native firewall service for AWS

Cloud NGFW for AWS enables organizations to shift security responsibility to Palo Alto, allowing them to speed cloud innovation while remaining secure, the vendor says.

Load More