newsAmazon’s AWS Control Tower aims to help secure your data’s bordersAs digital compliance tasks and data sovereignty rules get ever more complicated, Amazon wants automation to help.By Jon GoldNov 28, 20233 minsRegulationCloud Security news Cohesity taps Amazon for generative AI, cloud-based securityBy Jon GoldNov 13, 20233 minsGenerative AICloud SecurityData and Information Securityfeature Keep it secret, keep it safe: the essential role of cybersecurity in document managementBy Linda RosencranceNov 08, 20238 minsCSO and CISOCloud SecurityData and Information Security newsMost cloud moves found rushed as adopters underrate associated risks: ReportBy Shweta Sharma Nov 06, 20234 minsCloud Security brandpostSponsored by SysdigA blueprint for high-speed cloud-native security Nov 06, 20234 minsCloud Security featureHow to choose the best cloud security posture management toolsBy Linda Rosencrance Oct 30, 20238 minsThreat and Vulnerability ManagementCloud SecurityData and Information Security brandpostSponsored by Palo Alto NetworksCrucial insights for executives on CNAPPBy Zachary Malone, SE Academy Manager, Palo Alto Networks Oct 24, 20235 minsCloud Security newsLacework adds multiple extensions to its multicloud security platformBy Shweta Sharma Oct 24, 20233 minsCloud Security newsPalo Alto Networks updates Prisma Cloud with integrated cloud securityBy Shweta Sharma Oct 19, 20233 minsCloud Security ArticlesfeatureHow API authentication vulnerabilities are at the center of cloud security concernsMicrosoft’s cloud services have come under scrutiny in recent months, with APIs at the heart of the matter. Here are some strategies to help mitigate security issues that can arise when using APIs.By Susan Bradley Aug 23, 2023 6 minsAuthenticationCloud SecurityAPIsnewsMongoDB rolls out Queryable Encryption to secure sensitive data workflowsTechnology reduces risks of data exposure and can be used with AWS Key Management Service, Microsoft Azure Key Vault, and Google Cloud Key Management Service.By Michael Hill Aug 15, 2023 4 minsEncryptionCloud SecurityData and Information Securitynews analysisMultiple data center vulnerabilities could cripple cloud servicesVulnerabilities affect data center services commonly used by organizations and could be exploited by attackers to gain system access and perform remote code execution.By Michael Hill Aug 12, 2023 6 minsCloud SecurityVulnerabilitiesnewsGoogle Cloud launches Chronicle CyberShield to help government agencies tackle threatsThe solution enables governments to build cybersecurity skills and capabilities and facilitate knowledge sharing and collaboration.By Michael Hill Aug 10, 2023 4 minsGovernmentSecurity Operations CenterCloud SecuritynewsNew runtime security tool scans ongoing attacks in cloud workloadsSweet is a runtime security software that uses eBPF technology to scan and respond to runtime anomalies in cloud environments.By Shweta Sharma Aug 10, 2023 3 minsCloud SecuritySecurity Softwarenews analysisAttackers use Cloudflare Tunnel to proxy into victim networksExploiting Cloudflare Tunnel requires little skill and potentially could compromise and entire network.By Lucian Constantin Aug 08, 2023 6 minsCyberattacksCloud SecurityNetwork SecuritynewsKubernetes clusters under attack in hundreds of organizationsMalware and backdoors used in attacks affecting some Fortune 500 companies.By Michael Hill Aug 08, 2023 5 minsCloud SecurityNetwork SecurityOpen SourcenewsVectra AI unveils XDR platform with real-time attack signal intelligenceXDR platform uses native and third-party attack signals across hybrid cloud domains including AWS, Microsoft Azure, and Google Cloud as well as networks and endpoints.By Michael Hill Aug 08, 2023 4 minsThreat and Vulnerability ManagementCloud SecurityNetwork Securitynews analysisBeware of overly permissive Azure AD cross-tenant synchronization policiesA new proof of concept shows that attackers can use Azure AD CTS to leap to Microsoft and non-Microsoft application across tenants.By Lucian Constantin Aug 02, 2023 6 minsActive DirectoryAzure FunctionsCloud SecuritynewsIn new ransomware model, cloud provider acts as front for bad actors: reportA new report from anti-ransomware vendor Halcyon said that virtual private server provider Cloudzy is being used to host malicious activity from numerous sources.By Jon Gold Aug 01, 2023 3 minsRansomwareCloud SecuritynewsNew access management tool to focus on the least privileges ConductorOne’s cloud-based privileged access management product will allow security teams to grant just-in-time access to privileged resources.By Shweta Sharma Jul 28, 2023 3 minsCloud SecurityIdentity and Access ManagementnewsPalo Alto Networks adds new CI/CD security module to Prisma CloudNew module addresses security challenges of modern engineering ecosystems with capabilities spanning visibility, control, risk management, and breach detection.By Michael Hill Jul 27, 2023 5 minsCloud SecurityRisk Management Show more Show less View all Resources whitepaper Entrez dans l'ere de la collaboration securisee et intelligente This article is about how to enter a new era securely and efficiently. The post Entrez dans l'ere de la collaboration securisee et intelligente appeared first on Whitepaper Repository. By Box 27 Nov 2023Application Performance ManagementCloud ManagementCloud Security whitepaper Container Firewall for Amazon EKS workloads By AWS and Tigera 15 Nov 2023Cloud ComputingCloud SecuritySecurity whitepaper Forrester Report: The Executive's AI Primer By AWS 08 Nov 2023Artificial IntelligenceCloud SecurityMachine Learning View all Video on demand videoHoneypots and the evolution of botnets | Salted Hash Ep 23Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm’s recent honeypot research, which gathered information showing how the bot landscape is evolving. Apr 20, 2018 12 minsAdvanced Persistent ThreatsFirewallsBackup and Recovery DJI's bounty problems and video surveillance programs | Salted Hash Ep 13 Jan 08, 2018 21 minsData BreachHackingApplication Security Zero Trust networks and enterprise security strategy | Salted Hash Ep 12 Dec 18, 2017 26 minsCloud SecurityCloud ComputingSecurity The latest on Azure Stack, cyberattacks, the next iPhone and ... keyboards Jul 20, 2017 41 minsAppleMicrosoftSmartphones See all videos Explore a topic Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security View all topics All topics Close Application Security Business Continuity Business Operations Careers Compliance Critical Infrastructure Cybercrime Identity and Access Management Industry IT Leadership Network Security Physical Security Privacy Risk Management Security Security Infrastructure Software Development Vulnerabilities Generative AI Show me morePopularArticlesPodcastsVideos news UK CSO 30 Awards 2023 winners announced By Romy Tuin Dec 05, 20234 mins CSO and CISOC-SuiteRoles news analysis Deepfakes emerge as a top security threat ahead of the 2024 US election By Cynthia Brumfield Dec 05, 20237 mins Election HackingGovernmentSecurity Practices feature How cybersecurity teams should prepare for geopolitical crisis spillover By Christopher Whyte Dec 05, 202312 mins Advanced Persistent ThreatsThreat and Vulnerability ManagementRisk Management podcast CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO podcast CSO Executive Sessions Australia with Robbie Whittome, CISO at Curtin University Oct 16, 202315 mins CSO and CISO podcast CSO Executive Sessions / ASEAN: Cisco's Anthony Grieco on opportunities in Southeast Asia's cybersecurity landscape Oct 10, 202316 mins CSO and CISO video CSO Executive Sessions Australia with Sunil Sale, CISO at MinterEllison Nov 20, 202315 mins CSO and CISO video AI and Cybersecurity: Speed Bumps, Training, and Communication Nov 06, 202317 mins CyberattacksGenerative AI video CSO Executive Sessions Australia with Robbie Whittome Oct 16, 202315 mins CSO and CISO