Cloud Security

Cloud Security | News, how-tos, features, reviews, and videos

ransomware attack

Catalogic Software adds newer detection and backup capabilities

The new edition of the company’s data protection software DPX 4.8.1 adds backup for Microsoft 365 and other open virtualization platforms, including RedHat, Oracle, XenServer and KVM.

Tech Spotlight   >   Cloud [CSO]   >   Conceptual image of laptop users with cloud security overlay.

Wiz offers CVE-like cloud vulnerability registry, but will it gain traction?

The cloud vulnerability database, dubbed cloudvulndb.org and based on a GitHub repository, is seen as a welcome development, but widespread industry support is needed for it to be successful, analysts say.

Cloud security threats  >  Lightning strikes a digital landscape via binary clouds.

11 top cloud security threats

More data and applications are moving to the cloud, which creates unique infosecurity challenges. Here are the "Pandemic 11," the top security threats organizations face when using cloud services.

abstract internet network cyber security concept picture id1072278762

Google Cloud previews advanced new API security features

Google’s latest security update for Google Cloud is aimed at curbing API-based attacks.

cloud security expert casb binary cloud computing cloud security by metamorworks getty

Key takeaways from CSA’s SaaS Governance Best Practices guide

Security and governance policies and practices are failing to keep up with the growth of SaaS usage. The Cloud Security Alliance's guidance aims to get that back on track.

Google Cloud

Google Cloud gets new built-in security features

MITRE ATT&CK integration and baked-in DDoS prevention are now available in Google Cloud.

10 cloud security breach virtualization wireless

Palo Alto adds out-of-band web application security features to Prisma Cloud

Vendor says new updates will help organizations better monitor and secure web applications without impacting performance.

Computerworld > Microsoft OneDrive / Microsoft SharePoint

Ransomware could target OneDrive and SharePoint files by abusing versioning configurations

A proof-of-concept exploit could make Office 365 or Microsoft 365 documents stored on OneDrive or SharePoint inaccessible.

Tech Spotlight   >   Cloud [CSO]   >   Conceptual image of laptop users with cloud security overlay.

RSA: Cisco launches SASE, offers roadmap for other cloud-based services

New Cisco services aim to simplify security operations with new as-a-service offerings.

modern server room with server racks in data center picture id1186291565

HYAS brings security threat detection, response to production networks

HYAS Confront uses domain expertise and proprietary machine learning to monitor and detect anomalies in production network environments and improve visibility as applications move to the cloud.

cloud security / data protection / encryption / security transition

Deepfence Cloud builds on ThreatStryker security observability platform

The SaaS version of ThreatStryker will build on its real-time observation and protection abilities, spanning multiple cloud and development instances.

Intel

Intel bets big on security as a service for confidential computing

At its inaugural Vision event, Intel launched a security as a service initiative called Project Amber for confidential computing in the cloud, and outlined its support for secure and responsible AI and quantum-resistant cryptography....

programmer certification skills code devops glasses student by kevin unsplash

Progress launches Chef Cloud Security to extend DevSecOps to cloud-native assets

The software provider has also enhanced its underlying security and compliance mechanism Chef InSpec with new features.

Cloud Security

Wrongly configured Google Cloud API potentially creates dangerous functionality

Misconfiguration of the Google Cloud Platform API could create an exploitable behavior that leads to service compromise.

abstract face / digital identity

Firms struggling with non-person identities in the cloud

Enterprises turning to cloud identity governance, cloud infrastructure entitlements management. and AI-driven investigation, behavioral detection programs to treat cloud security ailments.

sdn software defined network architecture

New SDP 2.0 specification facilitates zero-trust maturity

The Cloud Security Alliance's Software-Defined Perimeter 2.0 specification creates a path to a zero-trust approach through strong access controls.

clothes pins cleaning laundry clean hygiene housekeeping by felix prado via unsplash 2400x1600

The cloud security emperor has no pants

“Shared responsibility” usually means that no one is responsible for minding the gap. Don’t fall in.

cloud security / data protection / encryption / security transition

Verica launches Prowler Pro solution to enhance AWS security

Verification vendor Verica and Prowler creator say enterprise-grade solution provides enhanced cloud security and new open-source tools.

A network of connected virtual container blocks.

Managing container vulnerability risks: Tools and best practices

The sooner you can identify vulnerabilities in containers, the better, and this advice on practices and tools can help.

API security alert / software development / application flow chart diagram

Qualys Multi-Vector EDR update prioritizes alert response

The latest version of the Qualys Multi-Vector EDR tool includes additional threat-hunting and risk mitigation capabilities, improving alert prioritization and reducing the time needed to respond to threats.

Load More
You Might Also Like