Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

modern server room with server racks in data center picture id1186291565
cloud security / data protection / encryption / security transition

Intel

Intel bets big on security as a service for confidential computing

At its inaugural Vision event, Intel launched a security as a service initiative called Project Amber for confidential computing in the cloud, and outlined its support for secure and responsible AI and quantum-resistant cryptography....

programmer certification skills code devops glasses student by kevin unsplash

Progress launches Chef Cloud Security to extend DevSecOps to cloud-native assets

The software provider has also enhanced its underlying security and compliance mechanism Chef InSpec with new features.

Cloud Security

Wrongly configured Google Cloud API potentially creates dangerous functionality

Misconfiguration of the Google Cloud Platform API could create an exploitable behavior that leads to service compromise.

abstract face / digital identity

Firms struggling with non-person identities in the cloud

Enterprises turning to cloud identity governance, cloud infrastructure entitlements management. and AI-driven investigation, behavioral detection programs to treat cloud security ailments.

sdn software defined network architecture

New SDP 2.0 specification facilitates zero-trust maturity

The Cloud Security Alliance's Software-Defined Perimeter 2.0 specification creates a path to a zero-trust approach through strong access controls.

clothes pins cleaning laundry clean hygiene housekeeping by felix prado via unsplash 2400x1600

The cloud security emperor has no pants

“Shared responsibility” usually means that no one is responsible for minding the gap. Don’t fall in.

cloud security / data protection / encryption / security transition

Verica launches Prowler Pro solution to enhance AWS security

Verification vendor Verica and Prowler creator say enterprise-grade solution provides enhanced cloud security and new open-source tools.

A network of connected virtual container blocks.

Managing container vulnerability risks: Tools and best practices

The sooner you can identify vulnerabilities in containers, the better, and this advice on practices and tools can help.

API security alert / software development / application flow chart diagram

Qualys Multi-Vector EDR update prioritizes alert response

The latest version of the Qualys Multi-Vector EDR tool includes additional threat-hunting and risk mitigation capabilities, improving alert prioritization and reducing the time needed to respond to threats.

A magnifying lens examines top secret information amid binary code.

Keeping secrets in a devsecops cloud-native world

Good secrets management practices can help identify and mitigate the risk to credentials, access keys, certificates and other sensitive data.

cloud security / data protection / encryption / security transition

Palo Alto launches cloud-native firewall service for AWS

Cloud NGFW for AWS enables organizations to shift security responsibility to Palo Alto, allowing them to speed cloud innovation while remaining secure, the vendor says.

access denied 123818297

New open-source tool tackles pesky access denial messages in AWS

Access Undenied will take a CloudTrail event with an 'Access Denied' outcome and tell you how to fix it.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

ExtraHop adds heat map to its AWS cloud-native security solution

Reveal(x) 360 uses AI and machine learning to give security teams real-time information on cyberattacks.

IBM service aims to secure multicloud operations

IBM’s new Unified Key Orchestrator lets customers integrate multiple security key-management systems into a single managed service that spans hybrid and multicloud environments.

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

Preparing Microsoft cloud networks for regional disruptions

The Ukrainian crisis shows has heightened awareness of risks to cloud infrastructure affected by political or natural disasters.

Binary stream flowing through the fingers and palm of an upturned hand.

Nearly 70% of tested ServiceNow instances leaking data

The blame lies with customer misconfigurations, not flaws in the SaaS platform.

CSO  >  secure mergers + acquisitions / handshake offer / extended hand / security shield / circuits

Google acquires Mandiant to enhance Google Cloud security suite

With Mandiant, Google Cloud will deliver an end-to-end security operations suite with greater capabilities and advisory services at every stage of the security lifecycle.

security system vulnerabilities - a grid of locks with several unlocked

Critical flaws in APC uninterruptible power supplies poses risks to mission-critical devices

Attackers can exploit cloud-connected APC Smart-UPS units to take control of the devices they protect.

Load More